First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in takeover of Automatic Service Request (ASR). CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Automatic Service Request | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3581 has been classified as an easily exploitable vulnerability affecting Oracle Automatic Service Request versions prior to 5.7.
To mitigate CVE-2017-3581, users should upgrade their Oracle Automatic Service Request software to version 5.7 or later.
CVE-2017-3581 affects users of Oracle Automatic Service Request versions prior to 5.7.
CVE-2017-3581 is classified as an easily exploitable vulnerability in the Automatic Service Request component of Oracle Support Tools.
The impact of CVE-2017-3581 is that a low privileged attacker with logon access can exploit the vulnerability to perform unauthorized actions within the infrastructure.