CVE-2026-21932
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-30
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | graalvm | 21.3.16 |
| oracle | graalvm_for_jdk | 17.0.17 |
| oracle | graalvm_for_jdk | 21.0.9 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 1.8.0 |
| oracle | jdk | 11.0.29 |
| oracle | jdk | 17.0.17 |
| oracle | jdk | 21.0.9 |
| oracle | jdk | 25.0.1 |
| oracle | jre | 1.8.0 |
| oracle | jre | 1.8.0 |
| oracle | jre | 1.8.0 |
| oracle | jre | 11.0.29 |
| oracle | jre | 17.0.17 |
| oracle | jre | 21.0.9 |
| oracle | jre | 25.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition, specifically in the AWT and JavaFX components. It allows an unauthenticated attacker with network access to exploit the system via multiple protocols. The attack requires human interaction from someone other than the attacker. It affects Java deployments that run untrusted code, such as sandboxed Java Web Start applications or sandboxed Java applets that rely on the Java sandbox for security. Successful exploitation can lead to unauthorized creation, deletion, or modification of critical data accessible by these Java products.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized creation, deletion, or modification of critical data within Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition environments. This means attackers could compromise data integrity, potentially causing significant harm to applications and systems relying on these Java deployments. The scope of impact may extend beyond these products due to the nature of the attack.