Vulnerability Details : CVE-2023-22074
Vulnerability in the Oracle Database Sharding component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Select Any Dictionary privilege with network access via Oracle Net to compromise Oracle Database Sharding. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Database Sharding. CVSS 3.1 Base Score 2.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L).
Vulnerability category: Denial of service
Products affected by CVE-2023-22074
- Oracle » Database Server » Enterprise EditionVersions from including (>=) 19.3 and up to, including, (<=) 19.20cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*
- Oracle » Database Server » Enterprise EditionVersions from including (>=) 21.3 and up to, including, (<=) 21.11cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22074
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.4
|
LOW | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L |
0.9
|
1.4
|
Oracle | |
2.4
|
LOW | AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L |
N/A
|
N/A
|
Oracle:CPUOct2023 |
References for CVE-2023-22074
-
https://www.oracle.com/security-alerts/cpuoct2023.html
Oracle Critical Patch Update Advisory - October 2023Patch;Vendor Advisory
-
http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html
Oracle 19c / 21c Sharding Component Password Hash Exposure ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to