CVE-2026-21945
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-20

Last updated on: 2026-01-30

Assigner: Oracle

Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-20
Last Modified
2026-01-30
Generated
2026-05-07
AI Q&A
2026-02-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 17 associated CPEs
Vendor Product Version / Range
oracle graalvm 21.3.16
oracle graalvm_for_jdk 17.0.17
oracle graalvm_for_jdk 21.0.9
oracle jdk 1.8.0
oracle jdk 1.8.0
oracle jdk 1.8.0
oracle jdk 11.0.29
oracle jdk 17.0.17
oracle jdk 21.0.9
oracle jdk 25.0.1
oracle jre 1.8.0
oracle jre 1.8.0
oracle jre 1.8.0
oracle jre 11.0.29
oracle jre 17.0.17
oracle jre 21.0.9
oracle jre 25.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability described (CVE-2026-21945) results in a denial of service (DoS) condition by allowing an unauthenticated attacker to cause a hang or crash of affected Oracle Java SE and GraalVM products. It impacts availability but does not affect confidentiality or integrity.

There is no explicit information in the provided context or resources about how this vulnerability directly affects compliance with common standards and regulations such as GDPR or HIPAA.

However, since the vulnerability impacts availability (CVSS score 7.5, with an availability impact), organizations relying on these Oracle Java components for critical systems may face challenges in meeting availability requirements stipulated by such regulations.

Timely patching as recommended by Oracle is essential to maintain system availability and reduce risk, which indirectly supports compliance with standards that require maintaining system availability and security.


Can you explain this vulnerability to me?

This vulnerability affects Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. It allows an unauthenticated attacker with network access via multiple protocols to cause a hang or repeated crash (denial of service) in these products. It mainly impacts Java deployments that run untrusted code in sandboxed environments, such as Java Web Start applications or applets loaded from the internet. It does not affect server deployments that run only trusted code.


How can this vulnerability impact me? :

The vulnerability can lead to a denial of service (DoS) condition by causing the affected Java applications to hang or crash repeatedly. This can disrupt availability of services or applications relying on these Java environments, especially those running untrusted code in sandboxed contexts.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

Oracle strongly recommends the immediate application of the security patches provided in the January 2026 Critical Patch Update to mitigate this vulnerability.

Interim risk mitigation measures may include blocking network protocols required for attacks or restricting user privileges and package access, although these measures may disrupt functionality and are not substitutes for patching.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart