First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Automatic Service Request | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3232 is categorized as an easily exploitable vulnerability allowing low privileged attackers to access the affected system.
To fix CVE-2017-3232, upgrade your Oracle Automatic Service Request to version 5.7 or later.
Organizations using Oracle Automatic Service Request versions prior to 5.7 are affected by CVE-2017-3232.
CVE-2017-3232 affects the Automatic Service Request (ASR) component, specifically the ASR Manager subcomponent.
An attacker exploiting CVE-2017-3232 could potentially gain unauthorized access to the infrastructure where the Automatic Service Request is hosted.