CVE-2023-21893
Oracle Database Server vulnerability analysis and mitigation

Overview

CVE-2023-21893 is a vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server, affecting versions 19c and 21c. The vulnerability was disclosed on January 17, 2023. This difficult-to-exploit vulnerability allows unauthenticated attackers with network access via TCPS to potentially compromise Oracle Data Provider for .NET, though successful attacks require human interaction from a person other than the attacker (Oracle CPU Jan 2023).

Technical details

The vulnerability has been assigned a CVSS 3.1 Base Score of 7.5 (High) with the following vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates Network attack vector, High attack complexity, No privileges required, User interaction required, Unchanged scope, and High impact on Confidentiality, Integrity, and Availability (Oracle CPU Jan 2023).

Impact

A successful exploitation of this vulnerability can result in complete takeover of Oracle Data Provider for .NET. The vulnerability affects both Oracle Database Server installations and client-only installations on Windows platform (Oracle CPU Jan 2023).

Mitigation and workarounds

Oracle released patches for this vulnerability as part of its January 2023 Critical Patch Update. The fix is available for Oracle Database Server versions 19c and 21c. Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible to address this vulnerability (Oracle CPU Jan 2023).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management