First published: Tue Oct 17 2023(Updated: )
Vulnerability in the Oracle Database Sharding component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Select Any Dictionary privilege with network access via Oracle Net to compromise Oracle Database Sharding. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Database Sharding. CVSS 3.1 Base Score 2.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database | >=19.3<=19.20 | |
Oracle Database | >=21.3<=21.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-22074 is low, with a severity value of 2.4.
The affected software for CVE-2023-22074 is Oracle Database Server versions 19.3-19.20 and 21.3-21.11.
This vulnerability can be exploited by a high privileged attacker with Create Session, Select Any Dictionary privilege and network access.
To fix CVE-2023-22074, apply the necessary patches provided by Oracle Database Server.
You can find more information about CVE-2023-22074 at the following references: [Oracle Security Alerts](https://www.oracle.com/security-alerts/cpuoct2023.html) and [Packet Storm Security](http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html).