First published: Wed Oct 17 2018(Updated: )
Vulnerability in the Hyperion BI+ component of Oracle Hyperion (subcomponent: IQR - Foundation Services). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.0 Base Score 2.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Hyperion BI+ | =11.1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3184 is classified as a high-severity vulnerability.
To remediate CVE-2018-3184, upgrade to the patched version of Oracle Hyperion BI+ 11.1.2.4.
CVE-2018-3184 can be exploited by attackers with high privileges and network access via HTTP.
CVE-2018-3184 affects the Hyperion BI+ component specifically within the Foundation Services subcomponent.
Yes, CVE-2018-3184 is considered easily exploitable, allowing an attacker to compromise Hyperion BI+.