First published: Tue Apr 15 2025(Updated: )
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | ||
Oracle Solaris and Zettabyte File System (ZFS) | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30700 is classified as an easily exploitable vulnerability with a high severity level.
CVE-2025-30700 affects users of Oracle Solaris version 11 who utilize the pluggable authentication module.
To mitigate CVE-2025-30700, users should apply the latest security patches provided by Oracle.
CVE-2025-30700 can be exploited by low privileged attackers with network access via HTTP.
There is potential for CVE-2025-30700 to be actively exploited due to its easily exploitable nature.