Vulnerability Name: CVE-2020-2555 (CCN-174505) Assigned: 2019-12-10 Published: 2020-01-14 Updated: 2022-10-25 Summary: Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) . CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )9.1 Critical (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-502 Vulnerability Consequences: Other References: Source: MITRE Type: CNACVE-2020-2555 Source: MISC Type: Exploit, Third Party Advisory, VDB Entryhttp://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html Source: MISC Type: Exploit, Third Party Advisory, VDB Entryhttp://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html Source: MISC Type: Exploit, Third Party Advisory, VDB Entryhttp://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html Source: XF Type: UNKNOWNoracle-cpujan2020-cve20202555(174505) Source: CCN Type: Packet Storm Security [04-02-2020]Oracle Coherence Fusion Middleware Remote Code Execution Source: CCN Type: Packet Storm Security [04-14-2020]Oracle WebLogic Server 12.2.1.4.0 Remote Code Execution Source: CCN Type: Packet Storm Security [05-21-2020]WebLogic Server Deserialization Remote Code Execution Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCYKNOWN EXPLOITED VULNERABILITIES CATALOG Source: EXPLOIT-DB Type: EXPLOITOffensive Security Exploit Database [04-14-2020] Source: EXPLOIT-DB Type: EXPLOITOffensive Security Exploit Database [05-22-2020] Source: CCN Type: Oracle CPUJan2020Oracle Critical Patch Update Advisory - January 2020 Source: MISC Type: Vendor Advisoryhttps://www.oracle.com/security-alerts/cpujan2020.html Source: CCN Type: Oracle CPUJan2021Oracle Critical Patch Update Advisory - January 2021 Source: MISC Type: Vendor Advisoryhttps://www.oracle.com/security-alerts/cpujan2021.html Source: CCN Type: Oracle CPUJul2020Oracle Critical Patch Update Advisory - July 2020 Source: MISC Type: Vendor Advisoryhttps://www.oracle.com/security-alerts/cpujul2020.html Source: CCN Type: Oracle CPUJul2021Oracle Critical Patch Update Advisory - July 2021 Source: MISC Type: Patch, Vendor Advisoryhttps://www.oracle.com/security-alerts/cpujul2021.html Source: CCN Type: Oracle CPUOct2020Oracle Critical Patch Update Advisory - October 2020 Source: N/A Type: Vendor AdvisoryN/A Source: CCN Type: ZDI-20-128Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability Source: CCN Type: ZDI-20-128Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability Vulnerable Configuration: Configuration 1 :cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:* OR cpe:/a:oracle:coherence:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:coherence:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:coherence:3.7.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:rapid_planning:12.1:*:*:*:*:*:*:* OR cpe:/a:oracle:rapid_planning:12.2:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:*:*:*:*:*:*:*:* (Version >= 4.3.0.1.0 and <= 4.3.0.6.0) OR cpe:/a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.2.2) OR cpe:/a:oracle:healthcare_data_repository:7.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:commerce_platform:*:*:*:*:*:*:*:* (Version >= 11.3.0 and <= 11.3.2) OR cpe:/a:oracle:commerce_platform:11.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:commerce_platform:11.1.0:*:*:*:*:*:*:* OR cpe:/a:oracle:commerce_platform:11.2.0:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:oracle:fusion_middleware:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.3.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
oracle webcenter portal 12.2.1.3.0
oracle utilities framework 4.2.0.3.0
oracle utilities framework 4.2.0.2.0
oracle retail assortment planning 15.0
oracle utilities framework 4.4.0.0.0
oracle retail assortment planning 16.0
oracle coherence 12.2.1.3.0
oracle coherence 12.1.3.0.0
oracle coherence 3.7.1.0
oracle coherence 12.2.1.4.0
oracle webcenter portal 12.2.1.4.0
oracle rapid planning 12.1
oracle rapid planning 12.2
oracle utilities framework *
oracle utilities framework 4.4.0.2.0
oracle communications diameter signaling router *
oracle healthcare data repository 7.0.1
oracle commerce platform *
oracle commerce platform 11.0.0
oracle commerce platform 11.1.0
oracle commerce platform 11.2.0
oracle fusion middleware 12.1.3.0.0
oracle retail assortment planning 15.0
oracle utilities framework 4.2.0.2.0
oracle utilities framework 4.2.0.3.0
oracle utilities framework 4.3.0.3.0
oracle webcenter portal 12.2.1.3.0
oracle fusion middleware 12.2.1.3.0