Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-2351

CVSS 8.3 · High EPSS 2.77% · P86
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-2351

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. Note: The July 2021 Critical Patch Update introduces a number of Native Network Encryption changes to deal with vulnerability CVE-2021-2351 and prevent the use of weaker ciphers. Customers should review: "Changes in Native Network Encryption with the July 2021 Critical Patch Update" (Doc ID 2791571.1). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Oracle Database Server 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Oracle Database Server是美国甲骨文(Oracle)公司的一套关系数据库管理系统。该数据库管理系统提供数据管理、分布式处理等功能。 Oracle Database Server 存在授权问题漏洞,该漏洞源于Oracle数据库服务器的高级网络选项内不正确的输入验证。远程未经身份验证的攻击者可利用该漏洞执行任意代码。受影响的产品及版本如下:Oracle数据库服务器:12.1.0.2、12.2.0.1、19c.c。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Oracle CorporationWebLogic Server 12.2.1.3.0 -

II. Public POCs for CVE-2021-2351

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-2351

登录查看更多情报信息。

Same Patch Batch · Oracle Corporation · 2021-07-20 · 131 CVEs total

CVE-2021-24479.9 CRITICALOracle Secure Global Desktop输入验证错误漏洞
CVE-2021-24639.8 CRITICALOracle Commerce 输入验证错误漏洞
CVE-2021-23979.8 CRITICALOracle Fusion Middleware安全漏洞
CVE-2021-23949.8 CRITICALOracle Fusion Middleware输入验证错误漏洞
CVE-2021-23829.8 CRITICALOracle Fusion Middleware安全漏洞
CVE-2021-24569.8 CRITICALOracle Fusion Middleware安全漏洞
CVE-2021-24469.6 CRITICALOracle Secure Global Desktop输入验证错误漏洞
CVE-2021-23559.1 CRITICALOracle E-Business Suite输入验证错误漏洞
CVE-2021-23928.8 HIGHOracle Fusion Middleware 输入验证错误漏洞
CVE-2021-23918.8 HIGHOracle Fusion Middleware 输入验证错误漏洞
CVE-2021-23968.8 HIGHOracle Fusion Middleware 输入验证错误漏洞
CVE-2021-23498.6 HIGHOracle Hyperion 输入验证错误漏洞
CVE-2021-24368.2 HIGHOracle E-Business Suite 输入验证错误漏洞
CVE-2021-24098.2 HIGHOracle VM VirtualBox输入验证错误漏洞
CVE-2021-23598.2 HIGHOracle E-Business Suite输入验证错误漏洞
CVE-2021-23658.1 HIGHOracle E-Business Suite 输入验证错误漏洞
CVE-2021-24348.1 HIGHOracle E-Business Suite输入验证错误漏洞
CVE-2021-23628.1 HIGHOracle E-Business Suite输入验证错误漏洞
CVE-2021-23638.1 HIGHOracle E-Business Suite 输入验证错误漏洞
CVE-2021-24158.1 HIGHOracle E-Business Suite输入验证错误漏洞

Showing top 20 of 131 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-2351

No comments yet


Leave a comment