Vulnerability Details : CVE-2017-3356
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized read access to a subset of Oracle Marketing accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N).
Exploit prediction scoring system (EPSS) score for CVE-2017-3356
Probability of exploitation activity in the next 30 days: 0.10%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 41 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-3356
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
7.1
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N |
2.8
|
4.2
|
NIST |
References for CVE-2017-3356
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
Oracle Critical Patch Update - April 2017Vendor Advisory
-
http://www.securityfocus.com/bid/98058
Oracle E-Business Suite CVE-2017-3356 Remote Security VulnerabilityThird Party Advisory;VDB Entry
Products affected by CVE-2017-3356
- cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*