NVD Vulnerability Detail
Search Exploit, PoC
CVE-2021-2163
Summary

Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).

Publication Date April 23, 2021, 7:15 a.m.
Registration Date April 23, 2021, 10:03 a.m.
Last Update Nov. 21, 2024, 3:02 p.m.
CVSS3.1 : MEDIUM
スコア 5.3
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI)
影響の想定範囲(S) 変更なし
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
CVSS2.0 : LOW
Score 2.6
Vector AV:N/AC:H/Au:N/C:N/I:P/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required はい
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:oracle:jdk:11.0.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:16.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update281:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:* 15 15.0.2
cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:* 11 11.0.10
cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:* 13 13.0.6
Configuration6 or higher or less more than less than
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Oracle Java SE、Java SE Embedded および Oracle GraalVM Enterprise Edition における Libraries に関する脆弱性
Title Oracle Java SE、Java SE Embedded および Oracle GraalVM Enterprise Edition における Libraries に関する脆弱性
Summary

Oracle Java SE、Java SE Embedded および Oracle GraalVM Enterprise Edition には、Libraries に関する処理に不備があるため、完全性に影響のある脆弱性が存在します。

Possible impacts リモートの攻撃者により、情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 20, 2021, midnight
Registration Date May 14, 2021, 2:32 p.m.
Last Update Dec. 20, 2024, 6:10 p.m.
Affected System
オラクル
JDK 11.0.10
JDK 16
JDK 7 Update 291
JDK 8 Update 281
JRE 11.0.10
JRE 16
JRE 7 Update 291
JRE 8 Update 281
Oracle GraalVM Enterprise Edition 19.3.5
Oracle GraalVM Enterprise Edition 20.3.1.2
Oracle GraalVM Enterprise Edition 21.0.0.2
Oracle Java SE Embedded 8 Update 281
日立
Hitachi Application Server 
Hitachi Application Server for Developers 
Hitachi Automation Director 
Hitachi Compute Systems Manager 
Hitachi Configuration Manager 
Hitachi Device Manager 
Hitachi Dynamic Link Manager 
Hitachi Global Link Manager 
Hitachi Infrastructure Analytics Advisor (海外販売のみ)
Hitachi Ops Center Analyzer (海外販売のみ)
Hitachi Ops Center Analyzer viewpoint (海外販売のみ)
Hitachi Ops Center API Configuration Manager 
Hitachi Ops Center Automator 
Hitachi Ops Center Common Services (海外販売のみ)
Hitachi Replication Manager 
Hitachi Tiered Storage Manager 
Hitachi Tuning Manager 
uCosminexus Application Server 
uCosminexus Application Server(64) 
uCosminexus Application Server-R 
uCosminexus Client 
uCosminexus Developer 
uCosminexus Operator for Service Platform 
uCosminexus Primary Server Base 
uCosminexus Primary Server Base(64) 
uCosminexus Service Architect 
uCosminexus Service Platform 
uCosminexus Service Platform(64) 
Debian
Debian GNU/Linux 
Fedora Project
Fedora 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2021年05月14日]
  掲載
May 14, 2021, 2:32 p.m.
2 [2024年12月20日]
  影響を受けるシステム:ベンダ情報 (hitachi-sec-2021-114) の更新に伴い内容を更新
Dec. 20, 2024, 6:09 p.m.