First published: Tue Jan 17 2023(Updated: )
Vulnerability in the Oracle Database RDBMS Security component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database RDBMS Security. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Database RDBMS Security accessible data as well as unauthorized read access to a subset of Oracle Database RDBMS Security accessible data. CVSS 3.1 Base Score 6.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database | =19c | |
Oracle Database | =21c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21829 is medium with a severity value of 6.3.
Oracle Database Server versions 19c and 21c are affected by CVE-2023-21829.
A low privileged attacker with Create Session privilege can exploit CVE-2023-21829 through Oracle Net with network access.
Apply the necessary security patches provided by Oracle to mitigate CVE-2023-21829.
You can find more information about CVE-2023-21829 on the Oracle website: https://www.oracle.com/security-alerts/cpujan2023.html