// For flags

CVE-2023-21893

Oracle ODP.NET Managed Driver Improper Certificate Validation Vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Data Provider for .NET. Note: Applies also to Database client-only on Windows platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).

Vulnerabilidad en el componente Oracle Data Provider para .NET de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19c y 21c. Una vulnerabilidad difícil de explotar permite que un atacante no autenticado con acceso a la red a través de TCPS comprometa el proveedor de datos de Oracle para .NET. Los ataques exitosos requieren la interacción humana de una persona distinta del atacante. Los ataques exitosos a esta vulnerabilidad pueden resultar en la adquisición de Oracle Data Provider para .NET. Nota: También se aplica al cliente de base de datos únicamente en la plataforma Windows. CVSS 3.1 Puntuación base 7,5 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).

This vulnerability allows network-adjacent attackers to compromise transport security on affected installations of Oracle ODP.NET Managed Driver. An attacker must first obtain the ability to intercept and alter network traffic in order to exploit this vulnerability.
The specific flaw exists within the ValidateRemoteCertificate function. The issue results from the lack of proper validation of the server certificate. An attacker can leverage this vulnerability to disclose communications between the client and the server or to insert fraudulent server responses.

*Credits: Georg Jung
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2022-12-17 CVE Reserved
  • 2023-01-17 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-11-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Database Server
Search vendor "Oracle" for product "Database Server"
19c
Search vendor "Oracle" for product "Database Server" and version "19c"
-
Affected
Oracle
Search vendor "Oracle"
Database Server
Search vendor "Oracle" for product "Database Server"
21c
Search vendor "Oracle" for product "Database Server" and version "21c"
-
Affected