First published: Wed Jul 15 2020(Updated: )
Vulnerability in the Oracle Unified Directory product of Oracle Fusion Middleware (component: Security). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Unified Directory. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Unified Directory, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Unified Directory accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Unified Directory. CVSS 3.1 Base Score 8.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Unified Directory | =11.1.2.3.0 | |
Oracle Unified Directory | =12.2.1.3.0 | |
Oracle Unified Directory | =12.2.1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-14565 is high with a severity value of 8.1.
The versions 11.1.2.3.0, 12.2.1.3.0, and 12.2.1.4.0 of Oracle Unified Directory are affected by CVE-2020-14565.
A high privileged attacker with network access via HTTP can easily exploit CVE-2020-14565.
The component affected by CVE-2020-14565 is Security.
You can find more information about CVE-2020-14565 on the Oracle Security Alerts page: https://www.oracle.com/security-alerts/cpujul2020.html