### [CVE-2020-2764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2764) ![](https://img.shields.io/static/v1?label=Product&message=Java&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Java%20Advanced%20Management%20Console%3A%202.16%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Java%20SE%20accessible%20data.&color=brighgreen) ### Description Vulnerability in the Java SE product of Oracle Java SE (component: Advanced Management Console). The supported version that is affected is Java Advanced Management Console: 2.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). ### POC #### Reference - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpuapr2020.html #### Github No PoCs found on GitHub currently.