Plataforma
oracle
Componente
database-gateway-for-odbc
Corrigido em
11.2.1
12.1.1
12.2.1
18.0.1
19.0.1
CVE-2020-2517 is a security vulnerability affecting the Database Gateway for ODBC component of Oracle Database Server. This vulnerability allows a high-privileged attacker with network access to potentially compromise the gateway, leading to unauthorized data manipulation and a partial denial of service. Affected versions include 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, and 19c. A fix is available in version 19.0.1.
The impact of CVE-2020-2517 stems from the ability of a privileged attacker to exploit the vulnerability to gain unauthorized access to data managed by the Database Gateway for ODBC. This could involve unauthorized updates, insertions, or deletions of data, potentially leading to data corruption or loss. Furthermore, the vulnerability can be leveraged to cause a partial denial of service (DoS), disrupting the availability of the gateway and impacting applications that rely on it. The difficulty of exploitation is considered low, but the potential impact warrants immediate attention, especially in environments where data integrity and availability are critical.
CVE-2020-2517 was publicly disclosed on January 15, 2020. The vulnerability is considered difficult to exploit. As of the current date, there are no publicly known active exploitation campaigns or proof-of-concept exploits. This CVE is not currently listed on the CISA KEV catalog.
Organizations utilizing Oracle Database Server versions 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, and 19c, particularly those with complex data integration architectures relying on the Database Gateway for ODBC, are at risk. Environments with lax privilege management and broad network access to the gateway are especially vulnerable.
• linux / server:
journalctl -u oracle-db -g 'Database Gateway for ODBC'• oracle / database:
SELECT version FROM v$instance; -- Check Oracle version• generic web: Review Oracle audit logs for unusual activity related to the Database Gateway for ODBC, focusing on CREATE PROCEDURE and CREATE DATABASE LINK privileges.
disclosure
Status do Exploit
EPSS
0.32% (percentil 55%)
Vetor CVSS
The primary mitigation for CVE-2020-2517 is to upgrade to Oracle Database Server version 19.0.1 or later. If an immediate upgrade is not feasible, consider implementing stricter access controls and privilege management within the Oracle environment to limit the potential impact of a successful exploit. Review and restrict network access to the Database Gateway for ODBC. Monitor Oracle audit logs for suspicious activity related to the affected component. While a WAF cannot directly address this vulnerability, it can help detect and block malicious requests targeting the gateway.
Aplique el parche proporcionado por Oracle en el CPU de enero de 2020 para solucionar la vulnerabilidad en el Database Gateway for ODBC. Consulte el advisory de seguridad de Oracle para obtener más detalles e instrucciones específicas de actualización.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2020-2517 is a LOW severity vulnerability in Oracle Database Gateway for ODBC allowing a privileged attacker to potentially compromise the gateway and gain unauthorized data access.
You are affected if you are using Oracle Database Server versions 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, or 19c.
Upgrade to Oracle Database Server version 19.0.1 or later. Implement stricter access controls and monitor audit logs as a temporary workaround.
As of now, there are no publicly known active exploitation campaigns or proof-of-concept exploits for CVE-2020-2517.
Refer to the Oracle Security Alert for CVE-2020-2517: https://www.oracle.com/security-alerts/cpuapr2020.html
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.