Security restrictions bypass in Oracle Java SE - CVE-2018-2825
Published: April 19, 2018
Vulnerability identifier: #VU11959
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-2825
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Oracle
Affected software:
Oracle Java SE
Oracle Java SE
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.
The weakness exists in the Java SE component of Oracle Java SE due to improper security restrictions. A remote attacker can trick the victim into opening a specially crafted file and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the Java SE component of Oracle Java SE due to improper security restrictions. A remote attacker can trick the victim into opening a specially crafted file and execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2018-2825
Install update from vendor's website.