Unauthenticated Access Vulnerability in Oracle iStore Product by Oracle
CVE-2020-14596
8.2HIGH
Summary
The vulnerability in Oracle iStore allows an unauthenticated attacker with network access via HTTP to exploit the system. This exploitation requires human interaction from an individual other than the attacker. While localized within the Oracle iStore component of the Oracle E-Business Suite, the repercussions of successful attacks can extend beyond this application, leading to unauthorized access to crucial data and the potential for unauthorized updates, inserts, or deletions of sensitive information. The security of critical data could be severely compromised, making effective remediation essential.
Affected Version(s)
iStore 12.1.1-12.1.3
References
CVSS V3.1
Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved