CVE-2019-2821 — Improperly Implemented Security Check for Standard in Corporation Java
Severity
5.3MEDIUMNVD
EPSS
1.3%
top 20.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 23
Latest updateMay 24
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: T…
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.6 | Impact: 3.6
Affected Packages3 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-4664-6235-3f5j: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE)↗2022-05-24
OSV▶
CVE-2019-2821: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE)↗2019-07-23
CVEList▶
CVE-2019-2821: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE)↗2019-07-23
📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2019-2821 OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678)↗2019-07-16