First published: Wed Jul 18 2018(Updated: )
Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and 14.1.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Payments accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Banking Payments | =12.2.0 | |
Oracle Banking Payments | =12.3.0 | |
Oracle Banking Payments | =12.4.0 | |
Oracle Banking Payments | =12.5.0 | |
Oracle Banking Payments | =14.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-3025 is medium.
The versions 12.2.0, 12.3.0, 12.4.0, 12.5.0, and 14.1.0 of Oracle Banking Payments are affected by CVE-2018-3025.
CVE-2018-3025 can be exploited by a low privileged attacker with network access.
Yes, you can find references for CVE-2018-3025 at the following links: [Link 1](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html), [Link 2](http://www.securityfocus.com/bid/104790), [Link 3](http://www.securitytracker.com/id/1041307).
To fix CVE-2018-3025, it is recommended to apply the latest patches provided by Oracle Financial Services Applications.