| Vulnerability Name: | CVE-2019-2692 (CCN-159784) | ||||||||||||||||||||||||||||||||
| Assigned: | 2018-12-14 | ||||||||||||||||||||||||||||||||
| Published: | 2019-04-16 | ||||||||||||||||||||||||||||||||
| Updated: | 2020-08-24 | ||||||||||||||||||||||||||||||||
| Summary: | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) 5.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:L/AC:H/Au:S/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Other | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-2692 Source: CCN Type: Oracle CPUApr2019 Oracle Critical Patch Update Advisory - April 2019 Source: MISC Type: Patch, Vendor Advisory http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Source: BID Type: UNKNOWN 107925 Source: XF Type: UNKNOWN oracle-cpuapr2019-cve20192692(159784) Source: CONFIRM Type: UNKNOWN https://security.netapp.com/advisory/ntap-20190423-0002/ Source: CCN Type: IBM Security Bulletin 1170046 (API Connect) IBM API Connect is potentially impacted by vulnerabilities in MySQL | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||