Vulnerability Details : CVE-2023-22083
Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: Web UI). Supported versions that are affected are 9.0-9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Session Border Controller. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
Products affected by CVE-2023-22083
- Oracle » Enterprise Session Border ControllerVersions from including (>=) 9.0 and up to, including, (<=) 9.2cpe:2.3:a:oracle:enterprise_session_border_controller:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22083
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22083
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
Oracle | |
4.3
|
MEDIUM | AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
N/A
|
N/A
|
Oracle:CPUOct2023 |
References for CVE-2023-22083
-
https://www.oracle.com/security-alerts/cpuoct2023.html
Oracle Critical Patch Update Advisory - October 2023Patch;Vendor Advisory
Jump to