First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Automatic Service Request (ASR) accessible data as well as unauthorized access to critical data or complete access to all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Automatic Service Request | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3618 is considered easily exploitable and is rated with moderate severity.
To fix CVE-2017-3618, upgrade Oracle Automatic Service Request to version 5.7 or later.
CVE-2017-3618 affects users of Oracle Automatic Service Request prior to version 5.7.
CVE-2017-3618 specifically impacts the Automatic Service Request (ASR) component of Oracle Support Tools.
Yes, CVE-2017-3618 can be exploited by low-privileged attackers with access to the infrastructure where ASR is running.