First published: Mon Apr 24 2017(Updated: )
Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in takeover of Automatic Service Request (ASR). CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Automatic Service Request | <=5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3620 is classified as an easily exploitable vulnerability that affects low privileged users who can log on to the infrastructure.
To fix CVE-2017-3620, upgrade the Automatic Service Request component to version 5.7 or later.
CVE-2017-3620 affects Oracle Automatic Service Request versions prior to 5.7.
CVE-2017-3620 primarily impacts the Automatic Service Request component of Oracle Support Tools.
Low privileged attackers with access to the infrastructure are at risk from exploiting CVE-2017-3620.