Oracle Java SE < 11.0.23 — DoS
An unauthenticated attacker can trigger a denial of service in Oracle Java SE's Hotspot JIT compiler by sending crafted input to a Java application. Apply the April 2024 Critical Patch Update — Java powers many enterprise server applications.
An attacker can crash Java processes handling their requests, causing service interruption. Applications relying on JIT compilation for performance (such as application servers, middleware, and microservices) may repeatedly crash when targeted.
The HotSpot JIT compiler in Java SE contains a vulnerability that allows an unauthenticated remote attacker to cause a partial denial of service without any user interaction required beyond the attack itself.
Probably yes if any of these apply:
Affected OS versions
An e-commerce company discovers their Java-based payment processing service becomes unresponsive when a specific sequence of REST API calls is made. Investigation reveals an attacker was repeatedly sending crafted JSON payloads that triggered the HotSpot bug, causing intermittent outages. The fix is the April 2024 CPU update.
Manual remediation steps
⏱ 30 minutes per server including application restartCheck Installed Java Version
# Check default Java
java -version 2>&1
# Find all Java installations on the system
Get-ChildItem "C:\Program Files\Java" -ErrorAction SilentlyContinue
Get-ChildItem "C:\Program Files\Eclipse Adoptium" -ErrorAction SilentlyContinue
Get-ChildItem "C:\Program Files\Microsoft" -Filter "jdk*" -ErrorAction SilentlyContinue
# Check JAVA_HOME
$env:JAVA_HOME
Download and Install the April 2024 CPU
Or Use Adoptium (OpenJDK) as an Alternative
# Install via winget (Adoptium Temurin builds follow Oracle CPU release cycle)
winget install EclipseAdoptium.Temurin.21.JDK
winget install EclipseAdoptium.Temurin.17.JDK
Verify
java -version 2>&1
# Must show 8u411 / 11.0.23 / 17.0.11 / 21.0.3 or later
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References