First published: Tue Oct 17 2023(Updated: )
Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: Web UI). Supported versions that are affected are 9.0-9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Session Border Controller. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Enterprise Session Border Controller | >=9.0<=9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Oracle Enterprise Session Border Controller vulnerability is CVE-2023-22083.
The affected version range of Oracle Enterprise Session Border Controller is 9.0-9.2.
An unauthenticated attacker with network access via HTTPS can exploit this vulnerability.
The severity of CVE-2023-22083 is medium with a CVSS score of 4.3.
Please refer to the Oracle Security Alerts page (reference: https://www.oracle.com/security-alerts/cpuoct2023.html) for information on available patches or fixes.