5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.6 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.1%
Multiple serious vulnerabilities have been found in Oracle Java SE components. Malicious users can exploit these vulnerabilities to gain privileges, cause a denial of service or obtain sensitive information.
Below is a complete list of vulnerabilities:
Technical details
Vulnerability (1) is related to Java SE, Java SE Embedded and JRockit components of Oracle Java SE.
Vulnerability (1) is applicable to both client and server deployment of Java.
Vulnerability (1) can be exploited via sandboxed Java applets and sandboxed Java Web Start applications. Other way to exploit given vulnerability is to supply data to APIs in the specified Component. In this case neither Java Web Start applications nor sandboxed Java applets are necessary – attack can be performed, for example, through a web service.
Vulnerability (2) is related to Java SE, Java SE Embedded components of Oracle Java SE.
Successful attack of vulnerability (2) requires user interaction (with not the same person as the unauthenticated attacker).
Vulnerability (2) is frequently applicable to Java deployments, where clients use sandboxed Java applets and sandboxed Java Web Start applications, which load and run untrusted code, for example, code coming from the internet.
Vulnerability (2) is frequently not applicable to Java deployments, where only trusted code is loaded and run on servers (for example, code provided by an administrator).
Oracle Critical Patch Update Advisory
CVE-2016-5547 warning
CVE-2016-5549 warning
Update to the latest versions
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
statistics.securelist.com/
threats.kaspersky.com/en/product/Oracle-Java-JDK-1.7.x/
threats.kaspersky.com/en/product/Oracle-Java-JDK-1.8.x-3/
threats.kaspersky.com/en/product/Oracle-Java-JRE-1.7.x/
threats.kaspersky.com/en/product/Oracle-Java-JRE-1.8.x/
threats.kaspersky.com/en/product/Oracle-JRockit/
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
7.6 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.1%