First published: Tue Jul 20 2021(Updated: )
Vulnerability in the Oracle Database - Enterprise Edition Data Redaction component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition Data Redaction. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition Data Redaction accessible data. CVSS 3.1 Base Score 3.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database | =12.1.0.2 | |
Oracle Database | =12.2.0.1 | |
Oracle Database | =19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-2334 is a vulnerability in the Oracle Database - Enterprise Edition Data Redaction component of Oracle Database Server. It affects versions 12.1.0.2, 12.2.0.1, and 19c.
The severity of CVE-2021-2334 vulnerability is low, with a severity value of 3.5.
The CVE-2021-2334 vulnerability can be easily exploited by a low privileged attacker with Create Session privilege and network access.
The CVE-2021-2334 vulnerability affects Oracle Database versions 12.1.0.2, 12.2.0.1, and 19c.
You can find more information about the CVE-2021-2334 vulnerability on the Oracle website at https://www.oracle.com/security-alerts/cpujul2021.html.