First published: Wed Jul 18 2018(Updated: )
Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Payments, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Payments accessible data as well as unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Banking Payments | =12.2.0 | |
Oracle Banking Payments | =12.3.0 | |
Oracle Banking Payments | =12.4.0 | |
Oracle Banking Payments | =12.5.0 | |
Oracle Banking Payments | =14.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-2896 is medium.
Versions 12.2.0, 12.3.0, 12.4.0, 12.5.0, and 14.1.0 of Oracle Banking Payments are affected by CVE-2018-2896.
Yes, CVE-2018-2896 is an easily exploitable vulnerability.
An unauthenticated attacker with network access can exploit CVE-2018-2896.
You can find more information about CVE-2018-2896 at the following references:<br>- [Oracle Security Advisory](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)<br>- [SecurityFocus](http://www.securityfocus.com/bid/104790)<br>- [SecurityTracker](http://www.securitytracker.com/id/1041307)