The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-21449

CVE-2022-21449: Oracle GraalVM RCE Vulnerability

CVE-2022-21449 is a remote code execution flaw in Oracle GraalVM that enables attackers to compromise data integrity. This article covers the technical details, affected versions, security impact, and mitigation.

Published: February 18, 2026

CVE-2022-21449 Overview

CVE-2022-21449, widely known as "Psychic Signatures," is a critical cryptographic vulnerability affecting Oracle Java SE and Oracle GraalVM Enterprise Edition. The flaw exists in the Libraries component, specifically in the implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation. This vulnerability allows unauthenticated attackers with network access to bypass signature verification entirely by supplying specially crafted signatures with zero values, effectively undermining the integrity guarantees of ECDSA-signed data.

The vulnerability is particularly dangerous because ECDSA signatures are widely used in TLS certificates, JWT tokens, SAML assertions, and WebAuthn/FIDO authentication. An attacker can forge signatures that the vulnerable Java implementation will accept as valid, enabling unauthorized access to protected resources, man-in-the-middle attacks on TLS connections, and authentication bypass scenarios.

Critical Impact

Attackers can forge ECDSA signatures using zero-value parameters (r=0, s=0), completely bypassing cryptographic signature verification in affected Java versions. This enables TLS certificate forgery, JWT token manipulation, and authentication bypass.

Affected Products

  • Oracle Java SE 17.0.2 and 18
  • Oracle GraalVM Enterprise Edition 21.3.1 and 22.0.0.2
  • Azul Zulu 15.38, 17.32, and 18.28
  • Debian Linux 10.0 and 11.0
  • NetApp Active IQ Unified Manager (Windows/vSphere)
  • NetApp OnCommand Insight
  • NetApp Cloud Insights
  • NetApp E-Series SANtricity products

Discovery Timeline

  • April 19, 2022 - CVE-2022-21449 published to NVD
  • April 2022 - Oracle releases security patch in Critical Patch Update
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2022-21449

Vulnerability Analysis

The vulnerability stems from a fundamentally flawed implementation of ECDSA signature verification in Java's cryptographic libraries. In ECDSA, a valid signature consists of two integers, r and s, which must satisfy specific mathematical relationships based on the message hash and the signer's public key. A properly implemented verification routine must validate that both r and s are non-zero and within the valid range of the elliptic curve's order.

The vulnerable Java implementation fails to check whether r and s are zero before proceeding with signature verification. When an attacker supplies a signature where both r and s equal zero, the verification mathematics degenerates in a way that causes the implementation to incorrectly accept the signature as valid. This is trivially exploitable—any attacker can forge a valid-appearing signature for any message without possessing the private key.

The impact extends to any Java application relying on ECDSA for security, including TLS client certificate validation, JWT token verification, SAML assertion validation, and WebAuthn/FIDO2 authentication flows. The network-accessible attack vector requires no authentication, making it especially dangerous for internet-facing services.

Root Cause

The root cause is the absence of proper validation checks in the ECDSA signature verification code path. According to the ECDSA standard (SEC 1, Version 2.0, Section 4.1.4), implementations must verify that both signature components r and s are integers in the interval [1, n-1] where n is the order of the elliptic curve group. The vulnerable implementation failed to enforce this constraint, accepting zero values that should have been rejected immediately.

This oversight was introduced during a reimplementation of Java's elliptic curve cryptography in native Java code. The new implementation missed the critical boundary checks that were present in earlier versions using different underlying libraries.

Attack Vector

The attack vector is network-based with low complexity and requires no privileges or user interaction. An attacker can exploit this vulnerability through multiple protocols including:

  1. TLS/HTTPS: Forging server or client certificates signed with ECDSA
  2. JWT Tokens: Creating forged tokens with ES256, ES384, or ES512 algorithms
  3. SAML Assertions: Bypassing identity provider signature validation
  4. WebAuthn/FIDO2: Forging authenticator attestation and assertion signatures
  5. Code Signing: Bypassing signed JAR verification
go
func signGeneric(priv *PrivateKey, csprng *cipher.StreamReader, c elliptic.Curve, hash []byte) (r, s *big.Int, err error) {
        // SEC 1, Version 2.0, Section 4.1.3
        // CVE-2022-21449 - Modified and removed all calculations. Return r = s = 0
        r = new(big.Int)
        s = new(big.Int)
        return
}

Source: CVE-2022-21449 TLS PoC Repository

Detection Methods for CVE-2022-21449

Indicators of Compromise

  • ECDSA signatures containing zero values for r or s parameters in TLS handshakes, JWTs, or other signed data
  • Authentication successes with malformed or unusually short signature values
  • Unexpected successful TLS connections with certificates that should fail validation
  • JWT tokens with ES256/ES384/ES512 algorithms containing abnormal signature lengths

Detection Strategies

  • Monitor Java application logs for cryptographic exceptions or warnings related to signature verification
  • Implement network-level inspection for TLS handshakes containing malformed ECDSA signatures
  • Deploy endpoint detection rules to identify processes using vulnerable Java versions (17.0.2, 18) performing cryptographic operations
  • Create SIEM correlation rules for authentication events involving ECDSA-signed credentials with suspicious timing patterns

Monitoring Recommendations

  • Inventory all systems running affected Java versions and prioritize monitoring for those handling authentication or TLS termination
  • Enable verbose logging for Java security providers to capture signature verification operations
  • Monitor for exploitation attempts using intrusion detection signatures that identify zero-value ECDSA parameters
  • Track Java version across the environment and alert on unpatched systems exposed to network traffic

How to Mitigate CVE-2022-21449

Immediate Actions Required

  • Upgrade Oracle Java SE to version 17.0.3 or 18.0.1 or later immediately
  • Upgrade Oracle GraalVM Enterprise Edition to version 21.3.2 or 22.1.0 or later
  • For Azul Zulu users, update to the latest patched versions available from Azul
  • Audit applications for ECDSA usage in authentication, TLS, JWT, or code signing workflows
  • Consider temporarily switching to RSA-based signatures if immediate patching is not possible

Patch Information

Oracle addressed this vulnerability in the April 2022 Critical Patch Update (CPU). The fix adds proper validation to ensure signature components r and s are non-zero and within the valid range before proceeding with ECDSA verification. Organizations should apply patches from the Oracle Security Alert.

Additional security advisories and patches are available from:

  • Debian Security Advisory DSA-5128
  • Debian Security Advisory DSA-5131
  • NetApp Security Advisory NTAP-20220429-0006

Workarounds

  • If patching is delayed, consider using RSA-based algorithms instead of ECDSA for critical signature operations
  • Implement additional application-layer signature validation that explicitly checks for zero-value signature components
  • Deploy web application firewalls (WAF) or API gateways with rules to detect and block requests containing malformed ECDSA signatures
  • Isolate vulnerable Java applications from untrusted network traffic until patches can be applied
bash
# Verify your Java version and check if patching is required
java -version

# Check for vulnerable versions in your environment
find /usr -name "java" -type f -exec {} -version \; 2>&1 | grep -E "17\.0\.[0-2]|18\.0\.0"

# Update Java on Debian/Ubuntu systems
sudo apt update && sudo apt install openjdk-17-jdk

# Verify patch application by checking version is 17.0.3+ or 18.0.1+
java -version 2>&1 | grep -E "17\.0\.[3-9]|17\.0\.[1-9][0-9]|18\.0\.[1-9]|1[9-9]\."

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechOracle Graalvm

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability34.34%

  • Known ExploitedYes
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • NVD-CWE-noinfo
  • Technical References
  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • OpenWall OSS-Security Update

  • NetApp Security Advisory NTAP-20220429-0006

  • Debian Security Advisory DSA-5128

  • Debian Security Advisory DSA-5131

  • Oracle CPU April 2022 Alert
  • Vendor Resources
  • Oracle
  • Related CVEs
  • CVE-2024-20925: Oracle GraalVM RCE Vulnerability

  • CVE-2024-21094: Oracle GraalVM RCE Vulnerability

  • CVE-2024-21068: Oracle GraalVM RCE Vulnerability

  • CVE-2024-21131: Oracle GraalVM RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English