A serious vulnerability has been uncovered in Oracle’s enterprise identity management system, posing risks of severe exploitation by remote, unauthenticated attackers. This flaw, identified as CVE-2017-10151, has been given the highest possible CVSS score of 10, indicating it is both critical and easily exploitable without the need for any user intervention, as noted in Oracle’s advisory released earlier this week.

The vulnerability specifically impacts the Oracle Identity Manager (OIM) module within Oracle Fusion Middleware, a platform designed for automating the management of user access rights across organizations. This security gap arises from a “default account” accessible via HTTP by an attacker on the same network. Reports suggest this account could either have a hard-coded password or potentially none at all, thereby making it an easy target for intruders.

In Oracle’s advisory, the company emphasized that this flaw could be exploited without authentication, allowing attackers to traverse network barriers without needing any legitimate user credentials. Affected versions of Oracle Identity Manager include 11.1.1.7, 11.1.1.9, 11.1.2.1.0, 11.1.2.2.0, 11.1.2.3.0, and 12.2.1.3.0.

Oracle has addressed the matter by releasing patches for all affected versions. Organizations are strongly urged to implement these updates promptly to mitigate the risk posed by this vulnerability, which could be leveraged by malicious actors to seize control of enterprise systems. Oracle underscored the urgency in their communication, urging customers to apply the provided updates without delay.

For businesses operating older product versions that are not under Premier or Extended Support, Oracle cautioned that these could also be susceptible to similar vulnerabilities. The company reassured its clients that earlier versions of affected releases could reasonably be expected to share the same weaknesses, and therefore, upgrading to supported versions is highly recommended.

This vulnerability’s security patch follows closely on the heels of Oracle’s routine Critical Patch Update (CPU) for October 2017, which addressed a total of 252 vulnerabilities across its product range, including 40 specifically within Fusion Middleware, of which 26 vulnerabilities were identified as remotely exploitable without authentication.

Business owners should be mindful of not only implementing these latest patches but also conducting thorough reviews of their system security protocols. The potential for exploitation emphasizes the necessity for vigilance in maintaining secure environments to prevent unauthorized access. As this incident highlights serious concerns about remote attacks, understanding tactics aligned with frameworks like MITRE ATT&CK can provide deeper insights into adversary actions. Initial access to the system through misconfigured security settings exemplifies one potential vector, signaling the need for robust prevention measures.

The Oracle situation serves as a timely reminder for organizations to remain proactive in their cybersecurity efforts, ensuring that systems are adequately defended against possible breaches that stem from overlooked vulnerabilities.

Found this article interesting? Follow us on Google News, Twitter, and LinkedIn to read more exclusive content we post.

Source link