Unauthorized Data Access in Oracle Configurator by Oracle Corporation
CVE-2021-2078
8.2HIGH
Summary
The vulnerability in Oracle Configurator allows unauthenticated attackers with network access to exploit the product, potentially compromising sensitive data and systems. While requiring human interaction from a third party, the effects of a successful exploit can lead to unauthorized access to critical information. Attackers can perform unauthorized updates, inserts, or deletions on data accessible through Oracle Configurator. This vulnerability poses significant risks not only to the Configurator itself but also to other associated Oracle products, making it crucial for organizations to implement timely security measures.
Affected Version(s)
Configurator 12.1
Configurator 12.2
References
CVSS V3.1
Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved