First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via SFT to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in takeover of Automatic Service Request (ASR). CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Automatic Service Request | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3234 is rated as an easily exploitable vulnerability that allows unauthenticated attackers to compromise the Automatic Service Request.
To mitigate CVE-2017-3234, upgrade your Oracle Automatic Service Request Manager to version 5.7 or later.
CVE-2017-3234 affects all versions of Oracle Automatic Service Request prior to 5.7.
Yes, CVE-2017-3234 is considered remotely exploitable due to network access requirements.
CVE-2017-3234 impacts the Automatic Service Request (ASR) component of Oracle Support Tools.