First published: Wed Jan 15 2020(Updated: )
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Activity Guide). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Peoplesoft Enterprise Campus Software Campus Community | =8.56 | |
Oracle Peoplesoft Enterprise Campus Software Campus Community | =8.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2598 is rated as a high severity vulnerability that allows unauthenticated network access to the affected Oracle PeopleSoft versions.
To fix CVE-2020-2598, upgrade to a patched version of Oracle PeopleSoft Enterprise PeopleTools, specifically versions later than 8.57.
Organizations using Oracle PeopleSoft Enterprise PeopleTools version 8.56 and 8.57 are vulnerable to CVE-2020-2598.
CVE-2020-2598 allows attackers to compromise affected systems remotely over HTTP without authentication.
Yes, patching is crucial for CVE-2020-2598 to prevent potential unauthorized access and security breaches.