First published: Wed Oct 21 2020(Updated: )
Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Hyperion BI+ | =11.1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14770 is classified with a high severity level due to its potential for exploitation by high privileged attackers.
To fix CVE-2020-14770, update Oracle Hyperion BI+ to the latest version that is not affected by this vulnerability.
CVE-2020-14770 affects users of Oracle Hyperion BI+ version 11.1.2.4.
CVE-2020-14770 can be exploited through network access by high privileged attackers using multiple protocols.
Currently, there are no documented workarounds for CVE-2020-14770; the recommended solution is to apply the security update.