Unauthenticated Access Vulnerability in Oracle iSupport by Oracle
CVE-2020-2661
8.2HIGH
Summary
The vulnerability in Oracle iSupport allows an unauthenticated attacker with network access via HTTPS to compromise the system. While it primarily affects Oracle iSupport, successful exploitation can lead to unauthorized access to sensitive data and may allow for unauthorized modification, including updates and deletions. Notably, these attacks require human interaction from a user other than the attacker, making the vulnerability exploitable under specific conditions. This could significantly impact data integrity across additional Oracle products linked to iSupport, exposing organizations to the risk of critical data loss.
Affected Version(s)
iSupport 12.1.1-12.1.3
iSupport 12.2.3-12.2.9
References
CVSS V3.1
Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved