First published: Wed Oct 21 2020(Updated: )
Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hyperion BI+ accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Hyperion BI+ | =11.1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14767 is considered to be difficult to exploit but poses a significant risk if successfully attacked by a high privileged user.
To mitigate CVE-2020-14767, apply the recommended security patches provided by Oracle for version 11.1.2.4 of Hyperion BI+.
CVE-2020-14767 affects users of Oracle Hyperion BI+ version 11.1.2.4.
CVE-2020-14767 can be exploited via network access through multiple protocols.
CVE-2020-14767 specifically impacts the IQR-Foundation service component of Oracle Hyperion BI+.