This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Oracle Fusion Middleware has a critical flaw in the **OpenSSO Agent**. <br>π₯ **Consequences**: Attackers can execute **arbitrary code** remotely.β¦
π’ **Affected Vendor**: Oracle Corporation. <br>π¦ **Product**: Oracle Fusion Middleware (specifically **Access Manager**). <br>π **Versions**: 11.1.2.3.0, 12.2.1.3.0, and 12.2.1.4.0. If you run these, you are at risk!
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: <br>β Execute **Arbitrary Code** on the target server. <br>β Gain **Full Control** (High Impact on Confidentiality, Integrity, and Availability). <br>β No authentication required!β¦
π£ **Public Exploits**: **YES**. <br>π Multiple PoCs are available on GitHub (e.g., `antx-code/CVE-2021-35587`, `ZZ-SOCMAP/CVE-2021-35587`). <br>π€ **Automation**: Nuclei templates exist for mass scanning.β¦
π **Self-Check Methods**: <br>1. **Scan**: Use Nuclei templates (`http/cves/2021/CVE-2021-35587.yaml`). <br>2. **Verify**: Check if your Oracle Access Manager version matches the affected list. <br>3.β¦
π¨ **Urgency**: **CRITICAL / IMMEDIATE ACTION REQUIRED**. <br>π **Priority**: P1. <br>β³ **Reason**: Unauthenticated RCE with public PoCs. Do not wait. Patch now or isolate the system from the internet immediately.