Vulnerability Name:

CVE-2020-2555 (CCN-174505)

Assigned:2019-12-10
Published:2020-01-14
Updated:2022-10-25
Summary:Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
9.1 Critical (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-502
Vulnerability Consequences:Other
References:Source: MITRE
Type: CNA
CVE-2020-2555

Source: MISC
Type: Exploit, Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html

Source: MISC
Type: Exploit, Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html

Source: MISC
Type: Exploit, Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html

Source: XF
Type: UNKNOWN
oracle-cpujan2020-cve20202555(174505)

Source: CCN
Type: Packet Storm Security [04-02-2020]
Oracle Coherence Fusion Middleware Remote Code Execution

Source: CCN
Type: Packet Storm Security [04-14-2020]
Oracle WebLogic Server 12.2.1.4.0 Remote Code Execution

Source: CCN
Type: Packet Storm Security [05-21-2020]
WebLogic Server Deserialization Remote Code Execution

Source: CCN
Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY
KNOWN EXPLOITED VULNERABILITIES CATALOG

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [04-14-2020]

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-22-2020]

Source: CCN
Type: Oracle CPUJan2020
Oracle Critical Patch Update Advisory - January 2020

Source: MISC
Type: Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2020.html

Source: CCN
Type: Oracle CPUJan2021
Oracle Critical Patch Update Advisory - January 2021

Source: MISC
Type: Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html

Source: CCN
Type: Oracle CPUJul2020
Oracle Critical Patch Update Advisory - July 2020

Source: MISC
Type: Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2020.html

Source: CCN
Type: Oracle CPUJul2021
Oracle Critical Patch Update Advisory - July 2021

Source: MISC
Type: Patch, Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2021.html

Source: CCN
Type: Oracle CPUOct2020
Oracle Critical Patch Update Advisory - October 2020

Source: N/A
Type: Vendor Advisory
N/A

Source: CCN
Type: ZDI-20-128
Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability

Source: CCN
Type: ZDI-20-128
Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:coherence:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:coherence:12.1.3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:coherence:3.7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:*:*:*:*:*:*:*:* (Version >= 4.3.0.1.0 and <= 4.3.0.6.0)
  • OR cpe:/a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.2.2)
  • OR cpe:/a:oracle:healthcare_data_repository:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:commerce_platform:*:*:*:*:*:*:*:* (Version >= 11.3.0 and <= 11.3.2)
  • OR cpe:/a:oracle:commerce_platform:11.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:commerce_platform:11.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:commerce_platform:11.2.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:fusion_middleware:12.1.3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:utilities_framework:4.3.0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    oracle webcenter portal 12.2.1.3.0
    oracle utilities framework 4.2.0.3.0
    oracle utilities framework 4.2.0.2.0
    oracle retail assortment planning 15.0
    oracle utilities framework 4.4.0.0.0
    oracle retail assortment planning 16.0
    oracle coherence 12.2.1.3.0
    oracle coherence 12.1.3.0.0
    oracle coherence 3.7.1.0
    oracle coherence 12.2.1.4.0
    oracle webcenter portal 12.2.1.4.0
    oracle rapid planning 12.1
    oracle rapid planning 12.2
    oracle utilities framework *
    oracle utilities framework 4.4.0.2.0
    oracle communications diameter signaling router *
    oracle healthcare data repository 7.0.1
    oracle commerce platform *
    oracle commerce platform 11.0.0
    oracle commerce platform 11.1.0
    oracle commerce platform 11.2.0
    oracle fusion middleware 12.1.3.0.0
    oracle retail assortment planning 15.0
    oracle utilities framework 4.2.0.2.0
    oracle utilities framework 4.2.0.3.0
    oracle utilities framework 4.3.0.3.0
    oracle webcenter portal 12.2.1.3.0
    oracle fusion middleware 12.2.1.3.0