
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-35169 is a vulnerability affecting Oracle Database - Enterprise Edition versions 12.1.0.2, 19c, and 21c. The vulnerability was disclosed in Oracle's July 2022 Critical Patch Update. This is an improper input validation vulnerability that allows unauthenticated attackers with network access via TCPS to potentially compromise the database (Oracle CPU).
The vulnerability has a CVSS 3.1 Base Score of 9.1 (High severity) with the vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N. The vulnerability is easily exploitable and requires no privileges or user interaction to exploit. The attack vector is through the network via TCPS protocol (Oracle CPU).
Successful exploitation of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Database - Enterprise Edition accessible data. Additionally, it can lead to unauthorized access to critical data or complete access to all Oracle Database - Enterprise Edition accessible data (Oracle CPU).
Oracle has released patches for affected versions (12.1.0.2, 19c, and 21c) in the July 2022 Critical Patch Update. Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible to address this vulnerability (Oracle CPU).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."