First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Primavera Products Suite (subcomponent: Web Access). Supported versions that are affected are 8.3, 8.4, 15.1, 15.2, 16.1 and 16.2. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Primavera P6 Enterprise Project Portfolio Management | =8.3 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =8.4 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-3579 is classified as medium with a score of 6.1.
To fix CVE-2017-3579, you should apply the latest security patches provided by Oracle for the affected Primavera P6 versions.
CVE-2017-3579 affects Oracle Primavera P6 versions 8.3, 8.4, 15.1, 15.2, 16.1, and 16.2.
CVE-2017-3579 is classified as an easily exploitable vulnerability that allows unauthorized access.
No, CVE-2017-3579 can be exploited by an unauthenticated attacker.