Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-apsn-z1br-3bdy
Vulnerability ID VCID-apsn-z1br-3bdy
Aliases CVE-2026-21945
Summary openjdk: Enhance Certificate Checking (Oracle CPU 2026-01)
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
https://api.first.org/data/v1/epss?cve=CVE-2026-21945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1126119 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126119
2429927 https://bugzilla.redhat.com/show_bug.cgi?id=2429927
cpujan2026.html https://www.oracle.com/security-alerts/cpujan2026.html
RHSA-2026:0847 https://access.redhat.com/errata/RHSA-2026:0847
RHSA-2026:0848 https://access.redhat.com/errata/RHSA-2026:0848
RHSA-2026:0849 https://access.redhat.com/errata/RHSA-2026:0849
RHSA-2026:0895 https://access.redhat.com/errata/RHSA-2026:0895
RHSA-2026:0896 https://access.redhat.com/errata/RHSA-2026:0896
RHSA-2026:0897 https://access.redhat.com/errata/RHSA-2026:0897
RHSA-2026:0898 https://access.redhat.com/errata/RHSA-2026:0898
RHSA-2026:0899 https://access.redhat.com/errata/RHSA-2026:0899
RHSA-2026:0900 https://access.redhat.com/errata/RHSA-2026:0900
RHSA-2026:0901 https://access.redhat.com/errata/RHSA-2026:0901
RHSA-2026:0927 https://access.redhat.com/errata/RHSA-2026:0927
RHSA-2026:0928 https://access.redhat.com/errata/RHSA-2026:0928
RHSA-2026:0931 https://access.redhat.com/errata/RHSA-2026:0931
RHSA-2026:0932 https://access.redhat.com/errata/RHSA-2026:0932
RHSA-2026:0933 https://access.redhat.com/errata/RHSA-2026:0933
RHSA-2026:1606 https://access.redhat.com/errata/RHSA-2026:1606
RHSA-2026:4832 https://access.redhat.com/errata/RHSA-2026:4832
USN-7995-1 https://usn.ubuntu.com/7995-1/
USN-7996-1 https://usn.ubuntu.com/7996-1/
USN-7997-1 https://usn.ubuntu.com/7997-1/
USN-7998-1 https://usn.ubuntu.com/7998-1/
USN-8000-1 https://usn.ubuntu.com/8000-1/
USN-8001-1 https://usn.ubuntu.com/8001-1/
USN-8002-1 https://usn.ubuntu.com/8002-1/
USN-8003-1 https://usn.ubuntu.com/8003-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.oracle.com/security-alerts/cpujan2026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:04:39Z/ Found at https://www.oracle.com/security-alerts/cpujan2026.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.16874
EPSS Score 0.00053
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:32:28.293318+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21945.json 38.0.0