7.5
CVSSv3

CVE-2022-21449

Published: 19/04/2022 Updated: 13/05/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

It exists that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21434)

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle graalvm 21.3.1

oracle graalvm 22.0.0.2

oracle jdk 18

oracle jdk 17.0.2

debian debian linux 10.0

debian debian linux 11.0

netapp oncommand workflow automation -

netapp oncommand insight -

netapp cloud insights -

netapp e-series santricity storage manager -

netapp e-series santricity web services -

netapp solidfire \\& hci management node -

netapp santricity unified manager -

netapp hci compute node -

netapp 7-mode transition tool -

netapp active iq unified manager -

netapp e-series santricity os controller 11.0

netapp solidfire\\, enterprise sds \\& hci storage node -

Vendor Advisories

Synopsis Important: OpenJDK 1703 security update for Portable Linux Builds Type/Severity Security Advisory: Important Topic The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable LinuxRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS ...
Synopsis Important: java-17-openjdk security and bug fix update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8Red Hat Product Security has ra ...
Synopsis Important: OpenJDK 1703 security update for Windows Builds Type/Severity Security Advisory: Important Topic The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for WindowsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, w ...
The ECDSA signature verification from java 15 onward accecpted completely blank signatures as valid for an arbitrary message and public key ...
Synopsis Important: java-17-openjdk security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this upd ...
Several security issues were fixed in OpenJDK ...
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in information disclosure or denial of service For the oldstable distribution (buster), this problem has been fixed in version 11015+10-1~deb10u1 For the stable distribution (bullseye), this problem has been fixed in version 11015+10-1~deb11u1 We recom ...
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in information disclosure, incorrect validation of ECDSA signatures or denial of service For the stable distribution (bullseye), these problems have been fixed in version 1703+7-1~deb11u1 We recommend that you upgrade your openjdk-17 packages For the det ...
Several security issues were fixed in OpenJDK 8 ...
Several security issues were fixed in OpenJDK ...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP) Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11014, 1702, 18; Oracle GraalVM Enterprise Edition: 2035, 2131 and 22002 Easily exploitable vulnerability allows unauthenticated attacker with network ...
Synopsis Low: Release of OpenShift Serverless Version 1220 Type/Severity Security Advisory: Low Topic OpenShift Serverless version 1220 contains a moderate security impactThe References section contains CVE links providing detailed severity ratings for each vulnerability Ratings are based on a Common Vulnerability Scoring System (CVSS) ...

Github Repositories

CVE-2022-21449 Vulnerability tester Introduction There's a new CVE-2022-21449 that had bug in ECDSA signature verification It's one of the algorithms used with JWT for example Citing the blog post If you have deployed Java 15, Java 16, Java 17, or Java 18 in production then you should stop what you are doing and immediately update to install the fixes in the April

Hey, I'm Jamie Tanna (he/him/his) I'm currently between jobs, and I'm currently based in Nottingham I have a /now page, which aims to be a more up-to-date about page I use my personal website as a method of blogging about my learnings, as well as sharing information about projects I have previously, or am currently, working on in my spare time I maintain a nu

SignChecker Test tool to demonstrate the vulnerability of CVE-2022-21449

Demo program to showcase CVE-2022-21449 Pls run with JDK 1700

Books Applied Cryptography (Bruce Schneier) Introduction to Modern Cryptography: Principles and Protocols (Jonathan Katz & Yehuda Lindell) Real-World Cryptography (David Wong) The Joy of Cryptography (Mike Rosulek) Courses Cryptography I | Stanford Online Cryptography II | Stanford Online Crypto Attacks and Vulnerabilities AES Cache-timing attacks on AES - Daniel J

Java JWT A Java implementation of JSON Web Token (JWT) - RFC 7519 Important security note: JVM has a critical vulnerability for ECDSA Algorithms - CVE-2022-21449 Please review the details of the vulnerability and update your environment If you're looking for an Android version of the JWT Decoder take a look at our JWTDecodeAndroid library This library require

Learn250 Join me on my journey of learning for 250 days! It'll be indeed a fun challenge and we'll learn various things together Not only that, it will help me keep myself organized, motivated and focused ;) Day Topic 1 HTTP Request Smuggling on businessapplecom and Others - Writeup 2 A strategy to land your first pentest job - BlogAndroid Pentesting Se

CVE-2022-21449-TLS-PoC CVE-2022-21449 Proof of Concept demonstrating its usage with a vulnerable client and a malicious TLS server Building Requires some existing golang installation as well as maven, then run /buildsh

Proof-of-Concept labs This repository contains information, labs, and proof of concept for known vulnerabilities Sample Vulnerable Application of the JWT Null Signature A sample web application vulnerable to CVE-2022-21449

CVE-2022-21449 repo showcasing "psychic signatures in java"

Documentation - Getting Started - API Reference Feedback Documentation Examples - code samples for common java-jwt scenarios Docs site - explore our docs site and learn more about Auth0 Getting Started Requirements This library is supported for Java LTS versions 8, 11, and 17 For issues on non-LTS versions above 8, consideration will be given on a case-by-case basis j

jfrog-CVE-2022-21449

Which Version of JDK Should I Use? To build and run Java applications, a Java Compiler, Java Runtime Libraries, and a Virtual Machine are required that implement the Java Platform, Standard Edition ("Java SE") specification The OpenJDK is the open source reference implementation of the Java SE Specification, but it is only the source code Binary distributions are p

java-webauthn-server Server-side Web Authentication library for Java Provides implementations of the Relying Party operations required for a server to support Web Authentication This includes registering authenticators and authenticating registered authenticators Warning Psychic signatures in Java In April 2022, CVE-2022-21449 was disclosed in Oracle’s O

CVE-2022-21449: Psychic Signatures in Java

yara-rules CVE CVE-2022-21449

CVE-2022-21449-TLS-PoC CVE-2022-21449 (also dubbed Psychic Signatures in the vulnerability writeup by Neil Madden) Proof of Concept demonstrating its usage with a vulnerable client and a malicious TLS server The malicious server presents a valid (as of 2022-04-20) cert chain for wwwgooglecom which has an ECDSA pub key (secp256r1) However, the crypto/ecdsa package has been m

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

Recent Articles

Oracle already wins 'crypto bug of the year' with Java digital signature bypass
The Register • Liam Proven in Prague • 01 Jan 1970

Get our weekly newsletter Whole new meaning for zero consequences

Java versions 15 to 18 contain a flaw in its ECDSA signature validation that makes it trivial for miscreants to digitally sign files and other data as if they were legit organizations.
Cyber-criminals could therefore pass off cryptographically signed malicious downloads and bogus information as if it were real, and affected Java applications and services won't know the difference.
The scope of the damage that could be done is wide: encrypted communications, authentication tokens, cod...