First published: Sat Feb 17 2024(Updated: )
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.21 and 21.3-21.12. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Database | >=19.3<=19.21 | |
Oracle Database | >=21.3<=21.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20903 is rated as a high severity vulnerability, allowing an attacker with low privileges to compromise the system.
To fix CVE-2024-20903, apply the relevant security patches released by Oracle for affected versions of the Database Server.
CVE-2024-20903 affects Oracle Database versions 19.3 through 19.21 and 21.3 through 21.12.
CVE-2024-20903 can be exploited by low privileged attackers who have Create Session and Create Procedure privileges.
CVE-2024-20903 is easily exploitable via Oracle Net, allowing unauthorized actions against the database.