First published: Tue Apr 19 2022(Updated: )
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle FLEXCUBE Universal Banking | >=14.0.0<=14.3.0 | |
Oracle FLEXCUBE Universal Banking | =12.4.0 | |
Oracle FLEXCUBE Universal Banking | =14.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2022-21472 is a vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications that allows a low privileged attacker with network access via HTTP to compromise the system.
Versions 12.4, 14.0-14.3, and 14.5 of Oracle FLEXCUBE Universal Banking are affected by CVE-2022-21472.
The severity level of CVE-2022-21472 is medium with a CVSS score of 5.9.
A low privileged attacker can exploit CVE-2022-21472 by leveraging network access via HTTP.
Yes, Oracle has released a fix for CVE-2022-21472. It is recommended to update to the latest version of Oracle FLEXCUBE Universal Banking to mitigate the vulnerability.