7.3
EPSS
0.046%
Advisory Published
Updated

CVE-2024-20956

First published: Sat Feb 17 2024(Updated: )

Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Installation). Supported versions that are affected are Prior to 6.2.4.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Agile Product Lifecycle Management for Process accessible data as well as unauthorized read access to a subset of Oracle Agile Product Lifecycle Management for Process accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Agile Product Lifecycle Management for Process. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle Agile Product Lifecycle Management<6.2.4.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-20956?

    CVE-2024-20956 has been classified as an easily exploitable vulnerability that poses a significant risk for affected versions.

  • How do I fix CVE-2024-20956?

    To remediate CVE-2024-20956, upgrade to version 6.2.4.2 or later of the Oracle Agile Product Lifecycle Management for Process.

  • What components are affected by CVE-2024-20956?

    CVE-2024-20956 affects the Installation component of the Oracle Agile Product Lifecycle Management for Process.

  • Which versions of Oracle Agile Product Lifecycle Management for Process are vulnerable to CVE-2024-20956?

    Versions prior to 6.2.4.2 of Oracle Agile Product Lifecycle Management for Process are vulnerable to CVE-2024-20956.

  • Can CVE-2024-20956 be exploited remotely?

    Yes, CVE-2024-20956 can be exploited by an unauthenticated attacker with network access via HTTP.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203