Alert

One-third of the 12 new Java SE bugs carry a severity rating of high or critical

89% of the Java SE flaws can be exploited without user credentials 

 

DUBLIN and ATLANTA – October 17, 2018 – Waratek, the compiler-based application security company, has issued guidance on Oracle’s latest Critical Patch Update (CPU) for October 2018.

The final Oracle Critical Patch Update (CPU) of 2018 fixes 12 Java SE-related vulnerabilities and a dozen new WebLogic flaws, part of the 301 patches across Oracle’s product set. The number of Java SE flaws patched during the year is down 30% over 2017’s record high, but the number of vulnerabilities that can be exploited without credentials remains very high at 89%.

“The downward trend of Java SE patches appears to be positive, but it’s critical for business to remain diligent in their patching efforts as one-third of new vulnerabilities carry a severity rating of ‘high’ or ‘critical,’ and a very high number of vulnerabilities can still be exploited without user credentials,” noted John Matthew Holt, Founder and CTO of Waratek.

Highlights from the release include:

  1. One-third of the 12 new Java SE bugs carry a severity rating of high or critical; 11 of the 12 can be remotely exploited. Eight of the 12 new WebLogic vulnerabilities are critical.
  2. WebLogic is still plagued by Java deserialization vulnerabilities as many of the patches in this CPU are directed at preventing these exploits.
  3. Three legacy components, namely in Oracle Real-Time Decision Server, Oracle Adaptive Access Manager and in Oracle Communications Performance Intelligence Center (PIC) have been patched based on the Apache Struts 1 framework that has been EOL for 10 years.
  4. Oracle performed a deep-dive into their 3rd party dependencies and fixed more than 80 Java vulnerable components. Some of the vulnerable components had been vulnerable since 2014 (e.g. CVE-2014-3490).

Legacy versions of Java remain a risk

Java 8 is set for end-of-public support in January 2019, but the vast majority of patches in the Q4 and preceding updates address flaws in Java 8 and earlier versions of Java. In fact, this CPU includes fixes for CVEs dating back four years.

Only a relative handful of CVEs linked to Java 9, 10 and now 11, have been issued since the release of Java 9 in July 2017. Yet, various researchers continue to report that the vast majority of new enterprise applications continue to be written in Java 8. Java also remains the most popular programming language overall.

This creates a quandary for many organizations that are mandated to operate their applications on the most current version of the Java platform: incur the time, expense and risk of breaking functionality to upgrade/rewrite an application – or – virtually upgrade an out-of-support application using a compiler-based solution that instantly lifts a legacy application to a current version of Java without source code changes.

Failing to apply patches is also risky

Oracle advises Java users to apply all critical patches “without delay.” This is often not practical for organizations regardless of the size and complexity of a business. The amount of time required to patch enterprise applications in large businesses and the resource constraints in smaller ones, coupled with the risk of breaking an applications functionality, are common barriers to applying binary patches on a timely basis.

Applying runtime virtual patches using the compiler of the Java Virtual Machine allows for functional equivalent patches to fix flawed code without downtime, source code changes or risk of breaking an application.

For more information about how the October 2018 Oracle Critical Patch Update may impact your applications and how we can help protect your applications with no downtime or source code changes, please contact Waratek.

Advice

Waratek Patch and Waratek Enterprise customers will receive runtime virtual patches that address the Q4 CVEs under their agreements. Some CVEs are also addressed in Waratek’s built-in CWE rules that offer active zero-day protection with zero tuning or configuration. For example, Waratek Enterprise users are already protected against all of these new deserialization vulnerabilities in WebLogic.

Non-customers should follow Oracle’s advice and apply the critical patch updates without delay.

WebLogic users that cannot immediately apply the latest CPU should consider preventing unauthorized T3 access through a firewall/proxy or via connection filters according to the instructions provided by Oracle in the support document 2076338.1. Additionally, WebLogic users could consider configuring the JVM’s global deserialization filter (JEP-290) after carefully profiling their apps.

About Waratek

Some of the world’s leading companies use Waratek to patch, secure and upgrade their mission critical applications. Waratek is a pioneer in the next generation of application security solutions. Using patented technology, Waratek makes it easy for security teams to instantly patch known Java and .NET flaws with no downtime, protect their applications from known and Zero Day attacks, and virtually upgrade out-of-support Java applications – all without time consuming and expensive source code changes or unacceptable performance overhead.

Waratek is one of CSO Online’s Best Security Software solutions of 2017, a winner  of the RSA Innovation Sandbox Award, and more than a dozen other awards and recognitions.

Waratek is based in Dublin, Ireland and Atlanta, Georgia.  For more information visit https://www.waratek.com/

Media Contact:

Mike Gallo
Lumina PR
212-239-8594 /
[email protected]

Related alerts

Ready to scale Security with modern software development?

Work with us to accelerate your adoption of Security-as-Code to deliver application security at scale.