Remote Code Execution Vulnerability in Oracle Java SE and JRockit
CVE-2017-3241
Key Information:
- Vendor
- Oracle
- Vendor
- CVE Published:
- 27 January 2017
Badges
Summary
This vulnerability affects Oracle's Java SE and JRockit components, enabling unauthenticated attackers with network access to potentially execute arbitrary code. By sending crafted requests to the RMI (Remote Method Invocation) APIs, attackers can manipulate the Java platform, leading to unauthorized access and compromise of affected systems. While primarily impacting Java SE configurations, the exploit could have broader implications across various Oracle products that utilize these Java components. It's critical for users to apply security updates to mitigate the risks associated with this vulnerability and ensure their systems remain secure.
Affected Version(s)
Java SE 6u131
Java SE 7u121
Java SE 8u112
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
63% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved