First published: Wed Jul 18 2018(Updated: )
Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Banking Payments accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Banking Payments | =12.2.0 | |
Oracle Banking Payments | =12.3.0 | |
Oracle Banking Payments | =12.4.0 | |
Oracle Banking Payments | =12.5.0 | |
Oracle Banking Payments | =14.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-3021 is medium with a severity value of 5.3.
The affected versions of Oracle Banking Payments are 12.2.0, 12.3.0, 12.4.0, 12.5.0, and 14.1.0.
Yes, CVE-2018-3021 is an easily exploitable vulnerability.
An unauthenticated attacker with network access can exploit CVE-2018-3021.
More information about CVE-2018-3021 can be found on the Oracle website and security advisory links provided.