First published: Wed Jan 16 2019(Updated: )
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) component of Oracle Communications Applications (subcomponent: Security). The supported version that is affected is prior to 8.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Diameter Signaling Router (DSR). CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Communications Diameter Signaling Router | <8.3 | |
<8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2399 is considered an easily exploitable vulnerability that allows unauthenticated network access.
To fix CVE-2019-2399, upgrade your Oracle Communications Diameter Signaling Router to version 8.3 or later.
CVE-2019-2399 affects users running versions of Oracle Communications Diameter Signaling Router prior to 8.3.
CVE-2019-2399 can be exploited by unauthenticated attackers with network access, potentially leading to unauthorized actions.
There are no known workarounds for CVE-2019-2399; the best mitigation is to upgrade to the latest software version.