First published: Tue Jan 17 2023(Updated: )
Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Data Provider for .NET. Note: Applies also to Database client-only on Windows platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Oracle.ManagedDataAccess.Core | >=2.19.0<2.19.180 | 2.19.180 |
nuget/Oracle.ManagedDataAccess | >=19.0.0<19.18.0 | 19.18.0 |
nuget/Oracle.ManagedDataAccess.Core | >=3.21.0<3.21.90 | 3.21.90 |
nuget/Oracle.ManagedDataAccess | >=21.0.0<21.9.0 | 21.9.0 |
Oracle Database Server | =19c | |
Oracle Database Server | =21c | |
=19c | ||
=21c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21893 is high with a severity value of 7.5.
Supported versions 19c and 21c of Oracle Database Server are affected by CVE-2023-21893.
CVE-2023-21893 can be exploited by an unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET.
To fix CVE-2023-21893, ensure you have the proper patched versions of Oracle.ManagedDataAccess.Core for the affected versions.
You can find more information about CVE-2023-21893 on the NIST NVD and Oracle's security alerts page.