Cyber Posture

CVE-2026-35229

High

Published: 21 April 2026

Published
21 April 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0005 15.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-35229 is a high-severity Improper Access Control (CWE-284) vulnerability in Oracle Java Virtual Machine. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the specific vulnerability in the Oracle Database Server Java VM by requiring timely patching as per Oracle's Critical Patch Update.

prevent

Enforces network boundaries to restrict unauthenticated network access via Oracle Net to the vulnerable Java VM component.

detect

Monitors system and network activity for indicators of exploitation attempts against the Java VM via anomalous Oracle Net traffic.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote unauthenticated network exploit (via Oracle Net) against a public-facing database server component, directly enabling T1190 for initial access and data exposure.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.30 and 21.3-21.21. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability…

more

can result in unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Deeper analysisAI

CVE-2026-35229 is a vulnerability in the Java VM component of Oracle Database Server. Supported versions affected include 19.3 through 19.30 and 21.3 through 21.21. The issue, associated with CWE-284 (Improper Access Control), was published on 2026-04-21 and carries a CVSS 3.1 Base Score of 7.5 (High) with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating high confidentiality impact but no integrity or availability effects.

An unauthenticated attacker with network access via Oracle Net can easily exploit this vulnerability to compromise the Java VM. Successful exploitation grants unauthorized access to critical data or complete access to all data accessible by the Java VM, potentially exposing sensitive information within the database environment.

Oracle's security advisory at https://www.oracle.com/security-alerts/cpuapr2026.html, part of the April 2026 Critical Patch Update, details patches and mitigation steps for addressing this vulnerability. Security practitioners should apply the relevant updates promptly to affected Oracle Database Server installations.

Details

CWE(s)

Affected Products

oracle
java virtual machine
19.3 — 19.30 · 21.3 — 21.21

CVEs Like This One

CVE-2025-50105Same vendor: Oracle
CVE-2026-34287Same vendor: Oracle
CVE-2026-21962Same vendor: Oracle
CVE-2025-50060Same vendor: Oracle
CVE-2026-21994Same vendor: Oracle
CVE-2026-21997Same vendor: Oracle
CVE-2026-22010Same vendor: Oracle
CVE-2026-34291Same vendor: Oracle
CVE-2026-34310Same vendor: Oracle
CVE-2026-22011Same vendor: Oracle

References