First published: Wed Oct 20 2021(Updated: )
Vulnerability in the Oracle Communications Session Border Controller product of Oracle Communications (component: Routing). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Session Border Controller. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Border Controller. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Communications Session Border Controller | =8.4 | |
Oracle Communications Session Border Controller | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-2416.
The affected software for this vulnerability is Oracle Communications Session Border Controller versions 8.4 and 9.0.
The severity rating of CVE-2021-2416 is medium with a severity value of 4.9.
An attacker with high privileges and network access via HTTP can easily exploit this vulnerability.
More information about CVE-2021-2416 can be found at the following link: [https://www.oracle.com/security-alerts/cpuoct2021.html](https://www.oracle.com/security-alerts/cpuoct2021.html).