Action Required: January 2025 Critical Patch Update addresses 17 vulnerabilities in Java SE. Update now.
Oracle.com Documentation Security Community

Java SE Security Advisories

Critical Patch Updates, security alerts, and vulnerability disclosures for Oracle Java SE.

Recent Critical Patch Updates

Oracle Critical Patch Update Advisory - January 2025

Released January 21, 2025 · Next scheduled: April 15, 2025
17
Vulnerabilities
5
Critical
7
High
5
Medium
View Details

Oracle Critical Patch Update Advisory - October 2024

Released October 15, 2024
14
Vulnerabilities
3
Critical
6
High
5
Medium
View Details

Oracle Critical Patch Update Advisory - July 2024

Released July 16, 2024
12
Vulnerabilities
2
Critical
5
High
5
Medium
View Details

January 2025 CPU - Vulnerability Details

The following vulnerabilities were addressed in the January 2025 Critical Patch Update for Java SE. All CVSS scores use CVSS v3.1.

CVE IDComponentSeverityCVSSVectorDescription
CVE-2025-21893JNDI Critical9.8 Network/LowRemote code execution via crafted LDAP referral response in JNDI lookup operations
CVE-2025-21847JSSE (TLS) Critical9.1 Network/LowTLS handshake bypass allowing man-in-the-middle interception of encrypted connections
CVE-2025-21902JAXP Critical9.0 Network/LowXML External Entity injection leading to server-side request forgery and data exfiltration
CVE-2025-21815RMI Critical8.8 Network/LowDeserialization of untrusted data in RMI registry enabling arbitrary code execution
CVE-2025-21778Security (PKI) Critical8.6 Network/LowCertificate validation bypass in X.509 path building allows forged certificate acceptance
CVE-2025-21834Hotspot (JIT) High7.5 Network/LowJIT compiler optimization flaw causing type confusion in compiled methods
CVE-2025-21856Serialization High7.5 Network/LowObject deserialization gadget chain in core libraries leading to denial of service
CVE-2025-218712D (ImageIO) High7.3 Network/LowHeap buffer overflow when parsing malformed TIFF images via ImageIO
CVE-2025-21809Networking High7.1 Network/LowHTTP/2 HPACK header compression implementation allows resource exhaustion
CVE-2025-21823JAXB High7.0 Network/HighXML unmarshalling vulnerability allowing class instantiation of arbitrary types
CVE-2025-21867Deployment High6.8 Network/HighJNLP file processing flaw enabling local privilege escalation via Web Start
CVE-2025-21881Security (JAAS) High6.5 Network/LowAuthentication bypass in Kerberos login module under specific realm configurations
CVE-2025-21912Swing Medium5.3 Network/LowInformation disclosure via crafted Swing component rendering in untrusted applets
CVE-2025-21798Sound Medium5.0 Local/LowOut-of-bounds read in MIDI file parser leading to information leakage
CVE-2025-21845Scripting (Nashorn) Medium4.8 Network/HighSandbox escape in Nashorn JavaScript engine under restricted security manager
CVE-2025-21889AWT Medium4.3 Network/LowDenial of service via malformed font file processing in AWT subsystem
CVE-2025-21907Libraries Medium3.7 Network/HighTiming side-channel in BigInteger modular exponentiation implementation

Affected Versions

The following table indicates which Java SE versions are affected by the January 2025 CPU vulnerabilities:

Java SE VersionAffectedFixed InEnd of Public Updates
Java SE 22.0.1NoN/ASeptember 2024
Java SE 21.0.5 (LTS)Yes21.0.6September 2028
Java SE 17.0.13 (LTS)Yes17.0.14September 2029
Java SE 11.0.25 (LTS)Yes11.0.26Extended Support
Java SE 8 Update 411Yes8 Update 421Extended Support

Resources