Unauthenticated Access Vulnerability in Oracle iSupport by Oracle
CVE-2020-2661

8.2HIGH

Key Information:

Vendor
Oracle
Status
Vendor
CVE Published:
15 January 2020

Summary

The vulnerability in Oracle iSupport allows an unauthenticated attacker with network access via HTTPS to compromise the system. While it primarily affects Oracle iSupport, successful exploitation can lead to unauthorized access to sensitive data and may allow for unauthorized modification, including updates and deletions. Notably, these attacks require human interaction from a user other than the attacker, making the vulnerability exploitable under specific conditions. This could significantly impact data integrity across additional Oracle products linked to iSupport, exposing organizations to the risk of critical data loss.

Affected Version(s)

iSupport 12.1.1-12.1.3

iSupport 12.2.3-12.2.9

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.