CVE-2024-21251
Oracle Database Server vulnerability analysis and mitigation

Overview

Vulnerability in the Java VM component of Oracle Database Server affecting supported versions 19.3-19.24, 21.3-21.15, and 23.4-23.5. This vulnerability requires a low-privileged attacker with Create Session and Create Procedure privileges to have network access via Oracle Net to potentially compromise the Java VM (Oracle Advisory).

Technical details

The vulnerability has been assigned a CVSS 3.1 Base Score of 3.1, indicating a low severity level with integrity impacts. The CVSS Vector is (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N), which breaks down to: Network attack vector, High attack complexity, Low privileges required, No user interaction needed, Unchanged scope, No impact on confidentiality, Low impact on integrity, and No impact on availability (Oracle Advisory).

Impact

Successful exploitation of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. The impact is limited to data integrity, with no effects on system confidentiality or availability (Oracle Advisory).

Mitigation and workarounds

Oracle has addressed this vulnerability in the October 2024 Critical Patch Update. Users should apply the security patches to affected versions (19.3-19.24, 21.3-21.15, and 23.4-23.5) as soon as possible. Until patches can be applied, organizations should carefully manage Create Session and Create Procedure privileges to reduce the risk of exploitation (Oracle Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management