Headline
CVE-2020-2806: Oracle Critical Patch Update Advisory - April 2020
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.28 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
No results found
Your search did not match any results.
We suggest you try the following to help find what you’re looking for:
- Check the spelling of your keyword search.
- Use synonyms for the keyword you typed, for example, try “application” instead of “software.”
- Try one of the popular searches shown below.
- Start a new search.
Trending Questions
Close
Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Please refer to:
- Critical Patch Updates, Security Alerts and Bulletins for information about Oracle Security Advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 399 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2020 Critical Patch Update: Executive Summary and Analysis.
Affected Products and Patch Information
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Affected Products and Versions
Patch Availability Document
Application Performance Management, versions 12.1.0.5, 13.2.0.0, 13.3.0.0
Enterprise Manager
Application Service Level Management, versions 13.2.0.0, 13.3.0.0
Enterprise Manager
Enterprise Manager Base Platform, versions 12.1.0.5, 13.2.0.0, 13.3.0.0
Enterprise Manager
Hyperion Financial Management, version 11.1.2.4
Fusion Middleware
Hyperion Financial Reporting, version 11.1.2.4
Fusion Middleware
Identity Manager Connector, version 9.0
Fusion Middleware
Instantis EnterpriseTrack, versions 17.1-17.3
Oracle Construction and Engineering Suite
Java Advanced Management Console, version 2.16
Java SE
JD Edwards EnterpriseOne Tools, version 9.2
JD Edwards
JD Edwards World Security, versions A9.3, A9.3.1, A9.4
JD Edwards
MICROS Relate CRM Software, version 11.4
Retail Applications
MySQL Client, versions 5.6.47 and prior, 5.7.29 and prior, 8.0.18 and prior
MySQL
MySQL Cluster, versions 7.3.28 and prior, 7.4.27 and prior, 7.5.17 and prior, 7.6.13 and prior, 8.0.19 and prior
MySQL
MySQL Connectors, versions 5.1.48 and prior, 8.0.19 and prior
MySQL
MySQL Enterprise Monitor, versions 4.0.11.5331 and prior, 8.0.18.1217 and prior
MySQL
MySQL Server, versions 5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior
MySQL
MySQL Workbench, versions 8.0.19 and prior
MySQL
Oracle Access Manager, versions 11.1.2.3.0, 12.2.1.3.0
Fusion Middleware
Oracle Agile PLM, versions 9.3.3, 9.3.5, 9.3.6
Oracle Supply Chain Products
Oracle API Gateway, version 11.1.2.4.0
Fusion Middleware
Oracle Application Express, versions prior to 19.2
Database
Oracle Application Testing Suite, versions 13.2.0.1, 13.3.0.1
Enterprise Manager
Oracle Banking Enterprise Collections, versions 2.7.0, 2.8.0
Oracle Banking Platform
Oracle Banking Enterprise Originations, versions 2.7.0, 2.8.0
Oracle Banking Platform
Oracle Banking Enterprise Product Manufacturing, versions 2.7.0, 2.8.0
Oracle Banking Platform
Oracle Banking Platform, versions 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0
Oracle Banking Platform
Oracle Big Data Discovery, version 1.6
Fusion Middleware
Oracle Business Intelligence Enterprise Edition, versions 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Business Process Management Suite, version 12.2.1.4.0
Fusion Middleware
Oracle Coherence, versions 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Communications ASAP Cartridges, versions 7.2, 7.3
Oracle Communications ASAP Cartridges
Oracle Communications Calendar Server, versions 8.0.0.2.0, 8.0.0.3.0
Oracle Communications Calendar Server
Oracle Communications Converged Application Server - Service Controller, version 6.1
Oracle Communications Converged Application Server - Service Controller
Oracle Communications Diameter Signaling Router (DSR), versions 8.0.0, 8.1.0, 8.2.0, 8.2.1
Oracle Communications Diameter Signaling Router
Oracle Communications Element Manager, versions 8.0.0, 8.1.0, 8.1.1, 8.2.0
Oracle Communications Element Manager
Oracle Communications Evolved Communications Application Server, version 7.1
Oracle Communications Evolved Communications Application Server
Oracle Communications Messaging Server, versions 8.0.2, 8.1.0
Oracle Communications Messaging Server
Oracle Communications Operations Monitor, versions 3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0
Oracle Communications Operations Monitor
Oracle Communications Service Broker, versions 6.0, 6.1
Oracle Communications Service Broker
Oracle Communications Services Gatekeeper, versions 6.0, 6.1
Oracle Communications Services Gatekeeper
Oracle Communications Session Report Manager, versions 8.0.0, 8.1.0, 8.1.1, 8.2.0
Oracle Communications Session Report Manager
Oracle Communications Session Route Manager, versions 8.0.0, 8.1.0, 8.1.1, 8.2.0
Oracle Communications Session Route Manager
Oracle Communications Unified Inventory Management, versions 7.3.0, 7.4.0
Oracle Communications Unified Inventory Management
Oracle Communications WebRTC Session Controller, version 7.2
Oracle Communications WebRTC Session Controller
Oracle Configurator, versions 12.1, 12.2
Oracle Supply Chain Products
Oracle Database Server, versions 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c
Database
Oracle E-Business Suite, versions 12.1.1-12.1.3, 12.2.3-12.2.9
E-Business Suite
Oracle Endeca Information Discovery Integrator, version 3.2.0
Fusion Middleware
Oracle Endeca Server, version 7.7.0
Fusion Middleware
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.6-8.0.9
Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Asset Liability Management, versions 8.0.6, 8.0.7
Oracle Financial Services Asset Liability Management
Oracle Financial Services Balance Sheet Planning, version 8.0.8
Oracle Financial Services Balance Sheet Planning
Oracle Financial Services Data Foundation, versions 8.0.6-8.0.9
Oracle Financial Services Data Foundation
Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management, versions 8.0.7, 8.0.8
Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management
Oracle Financial Services Funds Transfer Pricing, versions 8.0.6, 8.0.7
Oracle Financial Services Funds Transfer Pricing
Oracle Financial Services Hedge Management and IFRS Valuations, versions 8.0.6-8.0.8
Oracle Financial Services Hedge Management and IFRS Valuations
Oracle Financial Services Liquidity Risk Management, version 8.0.6
Oracle Financial Services Liquidity Risk Management
Oracle Financial Services Liquidity Risk Measurement and Management, versions 8.0.7, 8.0.8
Oracle Financial Services Liquidity Risk Measurement and Management
Oracle Financial Services Loan Loss Forecasting and Provisioning, versions 8.0.6-8.0.8
Oracle Financial Services Loan Loss Forecasting and Provisioning
Oracle Financial Services Market Risk Measurement and Management, versions 8.0.6, 8.0.8
Oracle Financial Services Market Risk Measurement and Management
Oracle Financial Services Price Creation and Discovery, version 8.0.7
Oracle Financial Services Price Creation And Discovery
Oracle Financial Services Profitability Management, versions 8.0.6, 8.0.7
Oracle Financial Services Profitability Management
Oracle Financial Services Revenue Management and Billing Analytics, versions 2.6, 2.7, 2.8
Oracle Financial Services Revenue Management and Billing Analytics
Oracle FLEXCUBE Core Banking, version 4.0
Oracle Financial Services Applications
Oracle FLEXCUBE Private Banking, versions 12.0, 12.1
Oracle Financial Services Applications
Oracle Fusion Middleware MapViewer, version 12.2.1.3.0
Fusion Middleware
Oracle Global Lifecycle Management NextGen OUI Framework, versions 12.2.1.3.0, 12.2.1.4.0, 13.9.4.2.2
Fusion Middleware
Oracle Global Lifecycle Management OPatch, versions prior to 11.2.0.3.23, prior to 12.2.0.1.19, prior to 13.9.4.2.1
Global Lifecycle Management
Oracle GraalVM Enterprise Edition, versions 19.3.1, 20.0.0
Oracle GraalVM Enterprise Edition
Oracle Health Sciences Information Manager, version 3.0
Health Sciences
Oracle Healthcare Data Repository, version 7.0
Health Sciences
Oracle Hospitality Reporting and Analytics, version 9.1.0
Oracle Hospitality Reporting and Analytics
Oracle HTTP Server, version 11.1.1.9.0
Fusion Middleware
Oracle In-Memory Performance-Driven Planning, versions 12.1, 12.2
Oracle Supply Chain Products
Oracle Insurance Accounting Analyzer, versions 8.0.6-8.0.9
Oracle Insurance Accounting Analyzer
Oracle Java SE, versions 7u251, 8u241, 11.0.6, 14
Java SE
Oracle Java SE Embedded, version 8u241
Java SE
Oracle Knowledge, versions 8.6.0-8.6.3
Oracle Knowledge
Oracle Managed File Transfer, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Outside In Technology, versions 8.5.4
Fusion Middleware
Oracle Real User Experience Insight, versions 13.1.2.1, 13.2.3.1, 13.3.1.0
Enterprise Manager
Oracle Retail Advanced Inventory Planning, versions 14.0, 15.0, 16.0
Retail Applications
Oracle Retail Back Office, version 14.1
Retail Applications
Oracle Retail Central Office, version 14.1
Retail Applications
Oracle Retail Customer Management and Segmentation Foundation, version 18.0
Retail Applications
Oracle Retail Merchandising System, version 16.0
Retail Applications
Oracle Retail Order Broker, versions 15.0, 16.0, 18.0, 19.0
Retail Applications
Oracle Retail Point-of-Service, version 14.1
Retail Applications
Oracle Retail Predictive Application Server, versions 15.0.3, 16.0.3
Retail Applications
Oracle Retail Returns Management, version 14.1
Retail Applications
Oracle Retail Store Inventory Management, version 16.0
Retail Applications
Oracle Retail Xstore Point of Service, versions 7.1, 15.0, 16.0, 17.0, 18.0, 18.0.1
Retail Applications
Oracle SD-WAN Edge, versions 7.3, 8.0, 8.1, 8.2
Oracle SD-WAN Edge
Oracle Secure Backup, versions prior to 18.1
Oracle Secure Backup
Oracle SOA Suite, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Solaris, versions 10, 11
Systems
Oracle Transportation Management, versions 6.3.7, 6.4.2, 6.4.3
Oracle Supply Chain Products
Oracle Unified Directory, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Utilities Framework, versions 2.2.0, 4.2.0.2, 4.2.0.3, 4.3.0.2-4.3.0.6, 4.4.0.0, 4.4.0.2
Oracle Utilities Applications
Oracle Utilities Network Management System, versions 1.12.0.3, 2.3.0.1, 2.3.0.2, 2.4.0.0
Oracle Utilities Applications
Oracle VM VirtualBox, versions prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
Virtualization
Oracle WebCenter Portal, versions 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle WebCenter Sites, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle ZFS Storage Appliance Kit, version 8.8
Systems
OSS Support Tools, versions 20.0, 20.1
Support Tools
PeopleSoft Enterprise CS Campus Community, version 9.2
PeopleSoft
PeopleSoft Enterprise HCM Absence Management, version 9.2
PeopleSoft
PeopleSoft Enterprise HRMS, version 9.2
PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.56, 8.57, 8.58
PeopleSoft
PeopleSoft Enterprise SCM Purchasing, version 9.2
PeopleSoft
Primavera Gateway, versions 16.2.0-16.2.11, 17.12.0-17.12.6, 18.8.0-18.8.8, 19.12.0
Oracle Construction and Engineering Suite
Primavera P6 Enterprise Project Portfolio Management, versions 16.2.0.0-16.2.19.3, 17.12.0.0-17.12.17.0, 18.8.0.0-18.8.18.0, 19.12.1.0-19.12.3.0, 20.1.0.0-20.2.0.0
Oracle Construction and Engineering Suite
Primavera Unifier, versions 16.1, 16.2, 17.7-17.12, 18.8, 19.12
Oracle Construction and Engineering Suite
Siebel Applications, versions 20.2 and prior
Siebel
StorageTek Tape Analytics SW Tool, version 2.3.0
Systems
Note:
- Vulnerabilities affecting either Oracle Database or Oracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document, My Oracle Support Note 1967316.1 for information on patches to be applied to Fusion Application environments.
- Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
- Users running Java SE with a browser can download the latest release from http://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.
Risk Matrix Content
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is a unique identifier for a vulnerability. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.
Security vulnerabilities are scored using CVSS version 3.0 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.0).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Workarounds
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Skipped Critical Patch Updates
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Critical Patch Update Supported Products and Versions
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
Credit Statement
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
- 21superman: CVE-2020-2828
- Abdullah H. AlJaber: CVE-2020-2753
- Abdulrahman Nour of Redforce: CVE-2020-2865
- Alexander Kornbrust of Red Database Security: CVE-2020-2737, CVE-2020-2946
- Alves Christopher: CVE-2020-2752
- Andrej Simko of Accenture: CVE-2020-2794, CVE-2020-2796, CVE-2020-2810
- Andrew Hess: CVE-2020-2910
- anhdaden of STAR Labs working with Trend Micro’s Zero Day Initiative: CVE-2020-2575, CVE-2020-2748, CVE-2020-2894, CVE-2020-2902, CVE-2020-2911
- Anil Aravind: CVE-2020-2864
- Bao Zhen: CVE-2020-2926
- Barakat Soror: CVE-2020-2913, CVE-2020-2914
- Barakat Soror working with Trend Micro Zero Day Initiative: CVE-2020-2907, CVE-2020-2958
- Bengt Jonsson of Uppsala University: CVE-2020-2767
- Bui Duong from Viettel Cyber Security: CVE-2020-2883, CVE-2020-2884
- Bui Quang: CVE-2020-2933
- Calvin Fong (Lord_Idiot) of STAR Labs working with Trend Micro Zero Day Initiative: CVE-2020-2748, CVE-2020-2758
- Christian Freudigmann of Daimler TSS: CVE-2020-2738
- Damian Bury: CVE-2020-2769, CVE-2020-2777
- Dan Amodio of Contrast Security: CVE-2020-2800
- Daniel Martinez Adan (aDoN90): CVE-2020-2738
- elasticheart from ICC working with Trend Micro Zero Day Initiative: CVE-2020-2741
- Esteban Montes Morales of Accenture: CVE-2020-2813
- Fangrun Li of Cloud Security Team at Qihoo 360: CVE-2020-2798, CVE-2020-2801, CVE-2020-2963
- Fatih Çelik: CVE-2020-2909
- Florian Ohlms of Daimler TSS: CVE-2020-2738
- GreenDog working with Trend Micro Zero Day Initiative: CVE-2020-2950
- JanatiIdrissi Zouhair: CVE-2020-2752
- Jang of VNPT ISC: CVE-2020-2883, CVE-2020-2884
- John Simpson of Trend Micro Security Research working with the Zero Day Initiative: CVE-2020-2882, CVE-2020-2956
- Julien Ahrens of RCE Security: CVE-2020-2870, CVE-2020-2871, CVE-2020-2872, CVE-2020-2873, CVE-2020-2874, CVE-2020-2876, CVE-2020-2877, CVE-2020-2878, CVE-2020-2879, CVE-2020-2880, CVE-2020-2881
- Juraj Somorovsky of Ruhr-University Bochum: CVE-2020-2767
- Kaki King: CVE-2020-2883
- Kasper Leigh Haabb, Secunia Research at Flexera: CVE-2020-2783, CVE-2020-2784, CVE-2020-2785, CVE-2020-2786, CVE-2020-2787
- Khaled Sakr of Malcrove: CVE-2019-2899
- khuyenn of Viettel Cyber Security: CVE-2020-2820, CVE-2020-2823, CVE-2020-2824, CVE-2020-2825, CVE-2020-2826, CVE-2020-2827, CVE-2020-2831, CVE-2020-2832, CVE-2020-2834, CVE-2020-2835, CVE-2020-2836, CVE-2020-2838, CVE-2020-2839, CVE-2020-2840, CVE-2020-2841, CVE-2020-2842, CVE-2020-2844, CVE-2020-2845, CVE-2020-2846, CVE-2020-2847, CVE-2020-2848, CVE-2020-2849, CVE-2020-2850, CVE-2020-2852, CVE-2020-2854, CVE-2020-2855, CVE-2020-2856, CVE-2020-2857, CVE-2020-2871
- Kostis Sagonas of Uppsala University: CVE-2020-2767
- Lalit Naphade: CVE-2020-2740
- Longofo of Knownsec 404 Team: CVE-2020-2798, CVE-2020-2949, CVE-2020-2963
- lufei from 0vul Team of Butian at Qi’anxin Group: CVE-2020-2869, CVE-2020-2883
- Maoxin Lin of Dbappsecurity Team: CVE-2020-2869, CVE-2020-2934
- Marc Durdin: CVE-2020-2930
- Marco Ivaldi of Media Service: CVE-2020-2771, CVE-2020-2851, CVE-2020-2944
- Marek Cybul: CVE-2020-2766
- Martin Doyhenard of Onapsis: CVE-2020-2750
- Matei “Mal” Badanoiu: CVE-2020-2869, CVE-2020-2875
- Mauro Leggieri of TRAPMINE Inc.: CVE-2020-2895
- Michal Bogdanowicz of STM Solutions: CVE-2020-2811
- Minle Chen of PingAn Galaxy Lab: CVE-2020-2798
- Nils Emmerich of ERNW : CVE-2020-2803, CVE-2020-2805
- Owais Zaman of Sabic: CVE-2020-2594, CVE-2020-2706
- Paul Fiterau Brostean of Uppsala University: CVE-2020-2767
- Pavel Cheremushkin: CVE-2020-2929, CVE-2020-2951
- Peter Dettman of cryptoworkshop.com: CVE-2020-2778
- Philippe Antoine (Telecom Nancy): CVE-2020-2752
- Piotr Domirski: CVE-2020-2745
- Quynh Le of VNPT ISC: CVE-2020-2798
- Quynh Le of VNPT ISC working with Trend Micro Zero Day Initiative: CVE-2020-2883
- r00t4dm from A-TEAM of Legendsec at Qi’anxin Group: CVE-2020-2798, CVE-2020-2829, CVE-2020-2963
- Reno Robert working with Trend Micro Zero Day Initiative: CVE-2020-2742, CVE-2020-2743, CVE-2020-2908
- Robert Merget of Ruhr-University Bochum: CVE-2020-2767
- Roger Meyer: CVE-2020-2514
- RunOu of Bangcle Security: CVE-2020-2798
- Rémi Badonnel (Telecom Nancy): CVE-2020-2752
- Samrat Das of Emirates NBD: CVE-2020-2772
- Sebastian Fuchs of NTT Security: CVE-2020-2744
- Sebastian Wlodarczyk of Optima Partners: CVE-2020-2747
- Simone Bordet of Webtide: CVE-2020-2781
- Tarun Sehgal of eSec Forte Technologies: CVE-2020-2782
- Tomasz Wisniewski: CVE-2020-2793
- Tuan Anh Nguyen of Viettel Cyber Security: CVE-2020-2789, CVE-2020-2807, CVE-2020-2808, CVE-2020-2809, CVE-2020-2815, CVE-2020-2817, CVE-2020-2818, CVE-2020-2819, CVE-2020-2820, CVE-2020-2821, CVE-2020-2822, CVE-2020-2823, CVE-2020-2824, CVE-2020-2825, CVE-2020-2826, CVE-2020-2827, CVE-2020-2831, CVE-2020-2832, CVE-2020-2833, CVE-2020-2834, CVE-2020-2835, CVE-2020-2836, CVE-2020-2837, CVE-2020-2838, CVE-2020-2839, CVE-2020-2840, CVE-2020-2841, CVE-2020-2842, CVE-2020-2843, CVE-2020-2844, CVE-2020-2845, CVE-2020-2846, CVE-2020-2847, CVE-2020-2848, CVE-2020-2849, CVE-2020-2850, CVE-2020-2852, CVE-2020-2854, CVE-2020-2855, CVE-2020-2856, CVE-2020-2857, CVE-2020-2858, CVE-2020-2860, CVE-2020-2861, CVE-2020-2863, CVE-2020-2871
- Vahagn Vardanyan: CVE-2020-2733
- Vaibhav Shukla: CVE-2020-2955
- Venustech ADLab: CVE-2020-2798, CVE-2020-2801
- Victor Rodriguez: CVE-2020-2739
- Vishnu Dev TJ working with Trend Micro’s Zero Day Initiative: CVE-2020-2929
- Xingwei Lin of Ant-financial Light-Year Security Lab: CVE-2020-2905
- Xinlei Ying of Ant-financial Light-Year Security Lab: CVE-2020-2905
- Xu Yuanzhen of Alibaba Cloud Security Team: CVE-2020-2869, CVE-2020-2934
- Yu Wang of BMH Security Team: CVE-2020-2883
- ZeddYu Lu: CVE-2020-2867
- Zhan Julien: CVE-2020-2752
- Ziming Zhang from Codesafe Team of Legendsec at Qi’anxin Group: CVE-2020-2959
- Zohaib Tasneem of Sabic: CVE-2020-2594, CVE-2020-2706
Security-In-Depth Contributors
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update Advisory, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program.:
- Abdullah H. AlJaber
- Andrej Simko of Accenture working with iDefense Labs
- ICHIHARA Ryohei of DMM.com LLC
- Jayson Grace of Sandia National Laboratories
- KeChen Lin of Ping An Bank Security Team
- Markus Loewe
- Mathieu Deous of Datadoghq
- Mehdi Benkaddour
- MengLiang Ji of CICITLab
- Michael Miller of Integrigy
- Raju Mogulapalli of Rheem Manufacturing
- tint0 of Viettel Cyber Security working with iDefense Labs
- Tuan Anh Nguyen of Viettel Cyber Security
On-Line Presence Security Contributors
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle’s On-Line Presence Security program:
- Anton Hrytskevich
- Chetan Tiwari
- Daniel J. Grinkevich
- Faizan Ahmed
- Hamit Cibo
- Heshie Brody
- Jimmy Bruneel
- Mohamed Yaser
- r00t4dm from A-TEAM of Legendsec at Qi’anxin Group
- Robert Lee Dick
- Shriram
- Wai Yan Aung
- Yash Ahmed Quashim
Critical Patch Update Schedule
Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:
- 14 July 2020
- 20 October 2020
- 19 January 2021
- 20 April 2021
References
- Oracle Critical Patch Updates, Security Alerts and Bulletins
- Critical Patch Update - April 2020 Documentation Map
- Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions
- Risk Matrix Definitions
- Use of Common Vulnerability Scoring System (CVSS) by Oracle
- English text version of the risk matrices
- CVRF XML version of the risk matrices
- Map of CVE to Advisory
- Software Error Correction Support Policy
- Oracle Lifetime support Policy
- JEP 290 Reference Blocklist Filter
Modification History
Date
Note
2020-July-20
Rev 11. Credit Statement Update.
2020-June-19
Rev 10. Credit Statement Update.
2020-June-15
Rev 9. Added note concerning the patch for CVE-2020-2801.
2020-May-27
Rev 8. Credit Statement Update.
2020-May-18
Rev 7. Updated protocol information for CVE-2020-2798, CVE-2020-2801, CVE-2020-2828, CVE-2020-2883, CVE-2020-2884 and CVE-2020-2915.
2020-May-06
Rev 6. Credit Statement Update.
2020-April-30
Rev 5. Credit Statement Update.
2020-April-24
Rev 4. Added CVE-2020-2575 for VirtualBox to the Virtualization Risk Matrix. This increases the overall number of security patches to 399. The releases listed in the patch availability document for Virtualization already include the patch for CVE-2020-2575. Updated CVSS score for CVE-2020-2894 in the Oracle Virtualization risk matrix. Modified the additional CVE list for CVE-2018-1165 in Oracle ZFS Storage Appliance Kit.
2020-April-17
Rev 3. Modified the affected versions for Oracle Outside In Technology vulnerabilities and updated the credit statement.
2020-April-16
Rev 2. Added entry in the Oracle Fusion Middleware risk matrix for Oracle WebLogic Server security patch to address CVE-2019-16943. This increases the overall number of security patches to 398. This is simply a documentation change. The patches were already listed in the patch availability document for Fusion Middleware.
2020-April-14
Rev 1. Initial Release.
Oracle Database Products Risk Matrices
This Critical Patch Update contains 10 new security patches for the Oracle Database Products divided as follows:
- 8 new security patches for Oracle Database Server.
- 1 new security patch for Oracle Global Lifecycle Management.
- 1 new security patch for Oracle Secure Backup.
Oracle Database Server Risk Matrix
This Critical Patch Update contains 8 new security patches for the Oracle Database Server. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
CVE#
Component
Package and/or Privilege Required
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2735
Java VM
Create Session
Oracle Net
No
8.0
Network
High
Low
Required
Changed
High
High
High
11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c
CVE-2016-10251
Oracle Multimedia
Create Session
Oracle Net
No
8.0
Network
Low
Low
Required
Un-
changed
High
High
High
12.1.0.2
CVE-2019-17563
WLM (Apache Tomcat)
None
HTTPS
Yes
7.5
Network
High
None
Required
Un-
changed
High
High
High
12.2.0.1, 18c, 19c
CVE-2020-2737
Core RDBMS
Create Session, Execute Catalog Role
Oracle Net
No
6.4
Network
High
High
Required
Un-
changed
High
High
High
11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c
CVE-2019-2853
Oracle Text
Create Session
OracleNet
No
6.3
Network
Low
Low
None
Un-
changed
Low
Low
Low
11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c
CVE-2016-7103
Oracle Application Express
None
HTTPS
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
Prior to 19.1
CVE-2020-2514
Oracle Application Express
End User Role
HTTPS
No
4.6
Network
Low
Low
Required
Un-
changed
None
Low
Low
Prior to 19.2
CVE-2020-2734
RDBMS/Optimizer
Execute on DBMS_SQLTUNE
Oracle Net
No
2.4
Network
Low
High
Required
Un-
changed
Low
None
None
12.1.0.2, 12.2.0.1, 18c, 19c
Additional CVEs addressed are below:
- The patch for CVE-2016-7103 also addresses CVE-2015-9251 and CVE-2019-11358.
- The patch for CVE-2019-17563 also addresses CVE-2019-12418.
- The patch for CVE-2019-2853 also addresses CVE-2019-2756, CVE-2019-2759 and CVE-2019-2852.
Oracle Global Lifecycle Management Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Global Lifecycle Management. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-20330
Oracle Global Lifecycle Management OPatch
Patch Installer
HTTP
No
0.0
Network
High
None
None
Un-
changed
None
None
None
Prior to 11.2.0.3.23, Prior to 12.2.0.1.19, Prior to 13.9.4.2.1
See Note 1
Notes:
- The following CVEs addressed by this patch are not exploitable in the Oracle product, so the CVSS score is 0.0.
Additional CVEs addressed are below:
- The patch for CVE-2019-20330 also addresses CVE-2016-4000, CVE-2016-4463, CVE-2018-1000873, CVE-2018-11307, CVE-2018-12022, CVE-2018-12023, CVE-2018-1320, CVE-2018-14718, CVE-2018-14719, CVE-2018-14720, CVE-2018-14721, CVE-2018-19360, CVE-2018-19361, CVE-2018-19362, CVE-2019-12086, CVE-2019-12384, CVE-2019-14379, CVE-2019-14439, CVE-2019-14540, CVE-2019-16335 and CVE-2020-8840.
Oracle Secure Backup Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2018-5712
Oracle Secure Backup
PHP
HTTPS
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
Prior to 18.1
Additional CVEs addressed are below:
- The patch for CVE-2018-5712 also addresses CVE-2018-5711.
Oracle Communications Applications Risk Matrix
This Critical Patch Update contains 39 new security patches for Oracle Communications Applications. 35 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-16943
Oracle Communications Calendar Server
Administration (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.0.0.2.0, 8.0.0.3.0
CVE-2015-3253
Oracle Communications Converged Application Server - Service Controller
Admin Console (Groovy)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
6.1
CVE-2016-4000
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (Jython)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2019-2729
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (Oracle WebLogic Server)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2019-14379
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2019-16943
Oracle Communications Evolved Communications Application Server
SDP, SCF and URD (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
7.1
CVE-2019-5482
Oracle Communications Operations Monitor
REST API (cURL)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0
CVE-2019-2904
Oracle Communications Service Broker
Admin Console (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
6.0, 6.1
CVE-2019-2904
Oracle Communications Services Gatekeeper
API Management Portal (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
6.0, 6.1
CVE-2019-10082
Oracle Communications Element Manager
Core (Apache HTTP Server)
HTTP
Yes
9.1
Network
Low
None
None
Un-
changed
High
None
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-10088
Oracle Communications Messaging Server
Security (Tika)
HTTP
Yes
8.8
Network
Low
None
Required
Un-
changed
High
High
High
8.0.2, 8.1.0
CVE-2018-8039
Oracle Communications Session Report Manager
Core (Apache CXF)
HTTP
Yes
8.1
Network
High
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2018-8039
Oracle Communications Session Route Manager
Core (Apache CXF)
HTTP
Yes
8.1
Network
High
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1
CVE-2019-0211
Oracle Communications Session Report Manager
Core (Apache HTTP Server)
None
No
7.8
Local
Low
Low
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-0211
Oracle Communications Session Route Manager
Core (Apache HTTP Server)
None
No
7.8
Local
Low
Low
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-0227
Oracle Communications ASAP Cartridges
Web Service (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
7.2, 7.3
CVE-2019-0222
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (Apache ActiveMQ)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2017-12626
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (Apache POI)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2018-15756
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (Spring Framework)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2018-1000180
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (Bouncy Castle Java Library)
TLS
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2019-0227
Oracle Communications Element Manager
Core (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-10072
Oracle Communications Element Manager
Core (Apache Tomcat)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-15163
Oracle Communications Operations Monitor
Packet Inspector, Traces functionality (libpcap)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0
CVE-2019-0227
Oracle Communications Session Report Manager
Core (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-10072
Oracle Communications Session Report Manager
Core (Apache Tomcat)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2018-15756
Oracle Communications Session Report Manager
Core (Spring Framework)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.1.1
CVE-2019-0227
Oracle Communications Session Route Manager
Core (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-10072
Oracle Communications Session Route Manager
Core (Apache Tomcat)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2018-15756
Oracle Communications Session Route Manager
Core (Spring Framework)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.0, 8.1.0, 8.1.1
CVE-2017-12626
Oracle Communications Unified Inventory Management
Bulk Import (Apache POI)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
7.3.0, 7.4.0
CVE-2019-11358
Oracle Communications Diameter Signaling Router (DSR)
IDIH Visualization (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.0.0, 8.1.0, 8.2.0, 8.2.1
CVE-2019-11358
Oracle Communications Operations Monitor
Mediation Engine, Calls Page (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
3.4.0, 4.0.0, 4.1.0
CVE-2019-11358
Oracle Communications WebRTC Session Controller
WSC-Console (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
7.2
CVE-2019-10247
Oracle Communications Element Manager
Core (Eclipse Jetty)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2018-20852
Oracle Communications Operations Monitor
VSP Webserver (Python)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
3.4.0, 4.0.0, 4.1.0, 4.2.0, 4.3.0
CVE-2019-10247
Oracle Communications Session Report Manager
Core (Eclipse Jetty)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-10247
Oracle Communications Session Route Manager
Core (Eclipse Jetty)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
8.0.0, 8.1.0, 8.1.1, 8.2.0
CVE-2019-14821
Oracle SD-WAN Edge
OS (Kernel)
None
No
3.9
Local
High
High
None
Un-
changed
Low
Low
Low
7.3, 8.0, 8.1, 8.2
See Note 1
CVE-2019-1010238
Oracle SD-WAN Edge
OS (Kernel)
SSH
No
2.0
Network
High
High
Required
Un-
changed
None
None
Low
7.3, 8.0, 8.1, 8.2
See Note 1
Notes:
- Versions 7.3, 8.0 and 8.1 are vulnerable only with Debian 5.1. Version 8.2 is vulnerable only with Oracle Linux 7.0.
Additional CVEs addressed are below:
- The patch for CVE-2018-1000180 also addresses CVE-2018-1000613.
- The patch for CVE-2019-0211 also addresses CVE-2019-0196, CVE-2019-0197, CVE-2019-0215, CVE-2019-0217 and CVE-2019-0220.
- The patch for CVE-2019-0222 also addresses CVE-2018-11775.
- The patch for CVE-2019-0227 also addresses CVE-2018-8032.
- The patch for CVE-2019-10072 also addresses CVE-2018-11784.
- The patch for CVE-2019-10082 also addresses CVE-2019-10081, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098 and CVE-2019-9517.
- The patch for CVE-2019-10088 also addresses CVE-2019-10093 and CVE-2019-10094.
- The patch for CVE-2019-10247 also addresses CVE-2019-10246.
- The patch for CVE-2019-14379 also addresses CVE-2019-14439.
- The patch for CVE-2019-15163 also addresses CVE-2019-15161, CVE-2019-15162, CVE-2019-15164 and CVE-2019-15165.
- The patch for CVE-2019-16943 also addresses CVE-2019-16942 and CVE-2019-17531.
- The patch for CVE-2019-2729 also addresses CVE-2019-2725.
- The patch for CVE-2019-5482 also addresses CVE-2019-15601 and CVE-2019-5481.
Oracle Construction and Engineering Risk Matrix
This Critical Patch Update contains 12 new security patches for Oracle Construction and Engineering. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2017-5645
Instantis EnterpriseTrack
Logging (Log4j)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
17.1 - 17.3
CVE-2019-17195
Primavera Gateway
Admin (Connect2id Nimbus JOSE+JWT)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
19.12.0
CVE-2019-16943
Primavera Gateway
Admin (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
17.12.0 - 17.12.6, 18.8.0 - 18.8.8, 19.12.0
CVE-2019-16943
Primavera Unifier
Infrastructure (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
16.1, 16.2, 17.7 - 17.12, 18.8, 19.12
CVE-2019-13990
Primavera Unifier
Infrastructure (Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
16.1, 16.2, 17.7 - 17.12, 18.8
CVE-2019-10082
Instantis EnterpriseTrack
Generic (Apache HTTP Server)
HTTP
Yes
9.1
Network
Low
None
None
Un-
changed
High
None
High
17.1 - 17.3
CVE-2019-17563
Instantis EnterpriseTrack
Generic (Apache Tomcat)
HTTP
Yes
7.5
Network
High
None
Required
Un-
changed
High
High
High
17.1 - 17.3
CVE-2019-12402
Primavera Gateway
Admin (Apache Commons Compress)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
18.8.0 - 18.8.8, 19.12.0
CVE-2019-10086
Primavera Gateway
Admin (Apache Commons Beanutils)
HTTP
Yes
7.3
Network
Low
None
None
Un-
changed
Low
Low
Low
16.2.0 - 16.2.11, 17.12.0 - 17.12.6
CVE-2020-2594
Primavera P6 Enterprise Project Portfolio Management
Project Manager
HTTP
No
6.5
Network
Low
Low
Required
Changed
Low
Low
Low
16.2.0.0 - 16.2.19.3, 17.12.0.0 - 17.12.17.0, 18.8.0.0 - 18.8.18.0, 19.12.1.0 - 19.12.3.0, 20.1.0.0 - 20.2.0.0
CVE-2019-12415
Instantis EnterpriseTrack
Office Open document processor (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
17.1 - 17.3
CVE-2020-2706
Primavera P6 Enterprise Project Portfolio Management
Project Manager
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
16.2.0.0 - 16.2.19.3, 17.12.0.0 - 17.12.17.0, 18.8.0.0 - 18.8.18.0, 19.12.1.0 - 19.12.3.0, 20.1.0.0 - 20.2.0.0
Additional CVEs addressed are below:
- The patch for CVE-2019-10082 also addresses CVE-2019-10081, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098 and CVE-2019-9517.
- The patch for CVE-2019-13990 also addresses CVE-2019-5427.
- The patch for CVE-2019-16943 also addresses CVE-2019-16942 and CVE-2019-17531.
Oracle E-Business Suite Risk Matrix
This Critical Patch Update contains 74 new security patches for the Oracle E-Business Suite. 70 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2020 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2020), My Oracle Support Note 2650675.1.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2838
Oracle CRM Gateway for Mobile Devices
Setup of Mobile Applications
HTTP
Yes
8.6
Network
Low
None
None
Changed
High
None
None
12.1.1-12.1.3
CVE-2020-2863
Oracle Advanced Outbound Telephony
User Interface
HTTP
No
8.5
Network
Low
Low
None
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2852
Oracle Advanced Outbound Telephony
Calendar
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2871
Oracle Advanced Outbound Telephony
User Interface
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2854
Oracle Advanced Outbound Telephony
User Interface
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2856
Oracle Advanced Outbound Telephony
User Interface
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2857
Oracle Advanced Outbound Telephony
User Interface
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2890
Oracle Applications Framework
Diagnostics
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.3, 12.2.3-12.2.9
CVE-2020-2820
Oracle Common Applications Calendar
Notes
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.8
CVE-2020-2823
Oracle Common Applications Calendar
Notes
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2881
Oracle CRM Technical Foundation
Preferences
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2873
Oracle Customer Interaction History
Outcome-Result
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2842
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2844
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2845
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2846
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2847
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2848
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2849
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2850
Oracle Depot Repair
Estimate and Actual Charges
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2885
Oracle Document Management and Collaboration
Attachments
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3,12.2.3-12.2.9
CVE-2020-2808
Oracle E-Business Intelligence
DBI Setups
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2809
Oracle E-Business Intelligence
DBI Setups
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2840
Oracle E-Business Intelligence
DBI Setups
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2874
Oracle Email Center
Customer Search
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2794
Oracle Email Center
Email Address list and Message Display
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2813
Oracle Email Center
KB Search
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2796
Oracle Email Center
Message Display
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2855
Oracle iSupport
Admin
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2878
Oracle iSupport
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2843
Oracle iSupport
Profile
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2815
Oracle iSupport
Profile
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2872
Oracle iSupport
Profile
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2841
Oracle Knowledge Management
Setup, Admin
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2880
Oracle Learning Management
OTA Training Activities
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2831
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2834
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2835
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2836
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2837
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2858
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2860
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2861
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2876
Oracle Marketing
Marketing Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2807
Oracle Marketing Encyclopedia System
Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2824
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2825
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2826
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2827
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2832
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2870
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2877
Oracle Partner Management
Attribute Admin Setup
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2833
Oracle Quoting
Courseware
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2817
Oracle Scripting
Miscellaneous
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2879
Oracle Scripting
Miscellaneous
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2839
Oracle Service Intelligence
Internal Operations- Search
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2821
Oracle Trade Management
Budget
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3, 12.2.3-12.2.8
CVE-2020-2822
Oracle Trade Management
Claims
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2818
Oracle Universal Work Queue
Work Provider Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2819
Oracle Universal Work Queue
Work Provider Administration
HTTP
Yes
8.2
Network
Low
None
Required
Changed
High
Low
None
12.1.1-12.1.3
CVE-2020-2882
Oracle Human Resources
Hierarchy Diagrammers
HTTP
No
8.1
Network
Low
Low
None
Un-
changed
High
High
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2956
Oracle Human Resources
Hierarchy Diagrammers
HTTP
No
8.1
Network
Low
Low
None
Un-
changed
High
High
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2750
Oracle General Ledger
Account Hierarchy Manager
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2866
Oracle Applications Framework
Attachments / File Upload
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
None
Low
None
12.2.5-12.2.9
CVE-2020-2889
Oracle CRM Technical Foundation
Preferences
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
12.1.3,12.2.3-12.2.9
CVE-2020-2887
Oracle Customer Interaction History
Outcome-Result
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
None
Low
None
12.1.1-12.1.3,12.2.3-12.2.9
CVE-2020-2864
Oracle iSupplier Portal
Accounts
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
12.1.3, 12.2.5-12.2.9
CVE-2020-2888
Oracle Marketing
Partners
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2753
Oracle Workflow
Workflow Notification Mailer
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
None
Low
None
12.1.3, 12.2.3-12.2.9
CVE-2020-2886
Oracle CRM Technical Foundation
Preferences
HTTP
Yes
4.7
Network
Low
None
Required
Changed
None
Low
None
12.1.3, 12.2.3-12.2.9
CVE-2020-2810
Oracle iStore
Shopping Cart
HTTP
Yes
4.7
Network
Low
None
Required
Changed
None
Low
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2789
Oracle iSupport
User Interface
HTTP
Yes
4.7
Network
Low
None
Required
Changed
None
Low
None
12.1.1-12.1.3,12.2.3-12.2.8
CVE-2020-2862
Oracle One-to-One Fulfillment
Print Server
HTTP
Yes
4.7
Network
Low
None
Required
Changed
Low
None
None
12.1.1-12.1.3, 12.2.3-12.2.9
CVE-2020-2772
Oracle Human Resources
Absence Recording, Maintenance
HTTP
No
4.1
Network
Low
Low
Required
Changed
None
Low
None
12.2.6-12.2.9
Oracle Enterprise Manager Risk Matrix
This Critical Patch Update contains 7 new security patches for Oracle Enterprise Manager. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2020 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2020 Patch Availability Document for Oracle Products, My Oracle Support Note 2633852.1.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2961
Enterprise Manager Base Platform
Discovery Framework (Oracle OHS)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
13.2.0.0, 13.3.0.0
CVE-2018-11058
Oracle Real User Experience Insight
Processing (Oracle Instant Client)
Multiple
No
8.8
Network
Low
Low
None
Un-
changed
High
High
High
13.1.2.1, 13.2.3.1, 13.3.1.0
CVE-2018-18311
Enterprise Manager Base Platform
Install (Perl)
HTTP
Yes
8.1
Network
High
None
None
Un-
changed
High
High
High
13.2.0.0, 13.3.0.0
CVE-2019-0227
Oracle Application Testing Suite
Oracle Flow Builder (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
13.2.0.1, 13.3.0.1
CVE-2019-1543
Enterprise Manager Base Platform
Discovery Framework (OpenSSL)
HTTPS
Yes
7.4
Network
High
None
None
Un-
changed
High
High
None
12.1.0.5, 13.2.0.0, 13.3.0.0
CVE-2019-11358
Application Service Level Management
Service Level Agreements (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
13.2.0.0, 13.3.0.0
CVE-2020-2946
Application Performance Management
EM Request Monitoring
HTTP
No
6.0
Network
Low
High
None
Un-
changed
High
Low
Low
12.1.0.5, 13.2.0.0, 13.3.0.0
Additional CVEs addressed are below:
- The patch for CVE-2018-11058 also addresses CVE-2016-0701, CVE-2016-2183, CVE-2016-6306, CVE-2016-8610, CVE-2018-11054, CVE-2018-11055, CVE-2018-11056, CVE-2018-11057 and CVE-2018-15769.
- The patch for CVE-2018-18311 also addresses CVE-2016-2381.
- The patch for CVE-2019-0227 also addresses CVE-2018-8032.
Oracle Financial Services Applications Risk Matrix
This Critical Patch Update contains 35 new security patches for Oracle Financial Services Applications. 16 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-2904
Oracle Banking Enterprise Collections
Framework (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.7.0, 2.8.0
CVE-2019-13990
Oracle Banking Enterprise Originations
Core (Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.7.0, 2.8.0
CVE-2019-2904
Oracle Banking Enterprise Originations
Framework (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.7.0, 2.8.0
CVE-2019-13990
Oracle Banking Enterprise Product Manufacturing
Core (Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.7.0, 2.8.0
CVE-2019-2904
Oracle Banking Enterprise Product Manufacturing
Framework (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.7.0, 2.8.0
CVE-2019-2904
Oracle Banking Platform
Framework (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0
CVE-2019-16943
Oracle Banking Platform
Framework (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0
CVE-2019-2904
Oracle Financial Services Revenue Management and Billing Analytics
Dashboards (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.6, 2.7, 2.8
CVE-2019-12419
Oracle FLEXCUBE Private Banking
Core (Apache CXF)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.0, 12.1
CVE-2019-2904
Oracle FLEXCUBE Private Banking
Framework (Application Development Framework)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.0, 12.1
CVE-2019-10088
Oracle FLEXCUBE Private Banking
Core (Apache Tika)
HTTP
Yes
8.8
Network
Low
None
Required
Un-
changed
High
High
High
12.0, 12.1
CVE-2019-17359
Oracle Financial Services Analytical Applications Infrastructure
Infrastructure (Bouncy Castle Java Library)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.0.6 - 8.0.9
CVE-2019-0227
Oracle FLEXCUBE Private Banking
Core (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
12.0, 12.1
CVE-2017-12626
Oracle FLEXCUBE Private Banking
Core (Apache POI)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
12.0, 12.1
CVE-2020-2793
Oracle Financial Services Analytical Applications Infrastructure
Infrastructure
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6 - 8.0.9
CVE-2020-2939
Oracle Financial Services Asset Liability Management
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6, 8.0.7
CVE-2020-2936
Oracle Financial Services Balance Sheet Planning
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.8
CVE-2020-2964
Oracle Financial Services Data Foundation
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6 - 8.0.9
CVE-2020-2945
Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management
User Interfaces
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.7, 8.0.8
CVE-2020-2941
Oracle Financial Services Funds Transfer Pricing
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6, 8.0.7
CVE-2020-2935
Oracle Financial Services Hedge Management and IFRS Valuations
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6 - 8.0.8
CVE-2020-2891
Oracle Financial Services Liquidity Risk Management
User Interfaces
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6
CVE-2020-2943
Oracle Financial Services Liquidity Risk Measurement and Management
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.7, 8.0.8
CVE-2020-2938
Oracle Financial Services Loan Loss Forecasting and Provisioning
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6 - 8.0.8
CVE-2020-2942
Oracle Financial Services Price Creation and Discovery
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.7
CVE-2020-2940
Oracle Financial Services Profitability Management
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6, 8.0.7
CVE-2020-2937
Oracle Insurance Accounting Analyzer
User Interface
HTTP
No
7.1
Network
Low
Low
None
Un-
changed
Low
High
None
8.0.6 - 8.0.9
CVE-2020-2955
Oracle FLEXCUBE Core Banking
Transaction Processing
HTTP
No
6.3
Network
Low
Low
None
Un-
changed
Low
Low
Low
4.0
CVE-2019-17091
Oracle Banking Enterprise Product Manufacturing
Core (Eclipse Mojarra)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
2.7.0, 2.8.0
CVE-2019-12415
Oracle Banking Enterprise Originations
Core (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
2.7.0, 2.8.0
CVE-2019-12415
Oracle Banking Enterprise Product Manufacturing
Core (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
2.7.0, 2.8.0
CVE-2019-12415
Oracle Banking Platform
Core (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, 2.9.0
CVE-2019-12415
Oracle Financial Services Analytical Applications Infrastructure
Infrastructure (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
8.0.6 - 8.0.9
CVE-2019-12415
Oracle Financial Services Market Risk Measurement and Management
Infrastructure (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
8.0.6, 8.0.8
CVE-2019-10247
Oracle FLEXCUBE Private Banking
Core (Eclipse Jetty)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
12.0, 12.1
Additional CVEs addressed are below:
- The patch for CVE-2019-0227 also addresses CVE-2018-8032.
- The patch for CVE-2019-10088 also addresses CVE-2019-10093 and CVE-2019-10094.
- The patch for CVE-2019-10247 also addresses CVE-2019-10246.
- The patch for CVE-2019-12415 also addresses CVE-2017-12626.
- The patch for CVE-2019-12419 also addresses CVE-2019-12406.
- The patch for CVE-2019-13990 also addresses CVE-2019-5427.
- The patch for CVE-2019-16943 also addresses CVE-2019-16942 and CVE-2019-17531.
Oracle Food and Beverage Applications Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Food and Beverage Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Component
Package and/or Privilege Required
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2746
Oracle Hospitality Reporting and Analytics
Admin
HTTP
No
8.1
Network
Low
Low
None
Un-
changed
High
High
None
9.1.0
Oracle Fusion Middleware Risk Matrix
This Critical Patch Update contains 52 new security patches for Oracle Fusion Middleware. 45 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update April 2020 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2020 Patch Availability Document for Oracle Products, My Oracle Support Note 2633852.1.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2950
Oracle Business Intelligence Enterprise Edition
Analytics Web General
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2016-1000031
Oracle Business Intelligence Enterprise Edition
BI Platform Security (Apache Commons FileUpload)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2020-2915
Oracle Coherence
Caching, CacheStore, Invocation
IIOP, T3
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2019-13990
Oracle Fusion Middleware MapViewer
Install (Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.2.1.3.0
CVE-2019-16943
Oracle Global Lifecycle Management NextGen OUI Framework
Tools (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
13.9.4.2.2, 12.2.1.3.0, 12.2.1.4.0
CVE-2016-10328
Oracle Outside In Technology
Installation (FreeType)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.5.4
See Note 1
CVE-2019-16943
Oracle WebCenter Portal
Security Framework (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.2.1.3.0, 12.2.1.4.0
CVE-2019-16943
Oracle WebCenter Sites
Sites (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.2.1.3.0, 12.2.1.4.0
CVE-2019-17571
Oracle WebLogic Server
Console (Apache Log4j)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0
CVE-2019-16943
Oracle WebLogic Server
Third Party Tools (jackson-databind)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.2.1.3.0, 12.2.1.4.0
CVE-2020-2801
Oracle WebLogic Server
Core
IIOP, T3
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
See Note 2
CVE-2020-2883
Oracle WebLogic Server
Core
IIOP, T3
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2020-2884
Oracle WebLogic Server
Core
IIOP, T3
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2019-10088
Oracle Business Process Management Suite
BPM Composer (Apache Tika)
HTTP
Yes
8.8
Network
Low
None
Required
Un-
changed
High
High
High
12.2.1.4.0
CVE-2017-5130
Oracle HTTP Server
Web Listener (LibXML2)
HTTP
Yes
8.8
Network
Low
None
Required
Un-
changed
High
High
High
11.1.1.9.0
CVE-2020-2867
Oracle WebLogic Server
Web Container
HTTP
Yes
8.2
Network
Low
None
None
Un-
changed
Low
High
None
12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2019-0222
Identity Manager Connector
General (Apache ActiveMQ)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
9.0
CVE-2018-15756
Identity Manager Connector
LDAP Gateway (Spring Framework)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
9.0
CVE-2015-7940
Oracle Business Intelligence Enterprise Edition
Installation (Bouncy Castle Java Library)
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2017-12626
Oracle Endeca Information Discovery Integrator
Integrator ETL (Apache POI)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
3.2.0
CVE-2019-17359
Oracle Managed File Transfer
MFT Runtime Server (Bouncy Castle Java Library)
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
12.2.1.3.0, 12.2.1.4.0
CVE-2019-15903
Oracle Outside In Technology
DC-Specific Component (LibExpat)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.5.4
See Note 1
CVE-2019-16168
Oracle Outside In Technology
DC-Specific Component (SQLite)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.5.4
See Note 1
CVE-2018-20843
Oracle Outside In Technology
Installation (FreeType)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.5.4
See Note 1
CVE-2019-17359
Oracle SOA Suite
Installation (Bouncy Castle Java Library)
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
12.2.1.3.0, 12.2.1.4.0
CVE-2019-17359
Oracle WebCenter Portal
Security Framework (Bouncy Castle Java Library)
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2020-2828
Oracle WebLogic Server
WLS Web Services
IIOP, T3
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
10.3.6.0.0
CVE-2020-2739
Oracle WebCenter Sites
Advanced UI
HTTP
Yes
7.4
Network
Low
None
Required
Changed
High
None
None
12.2.1.3.0
CVE-2020-2784
Oracle Outside In Technology
Outside In Filters
HTTP
Yes
7.3
Network
Low
None
None
Un-
changed
Low
Low
Low
8.5.4
See Note 1
CVE-2020-2785
Oracle Outside In Technology
Outside In Filters
HTTP
Yes
7.3
Network
Low
None
None
Un-
changed
Low
Low
Low
8.5.4
See Note 1
CVE-2020-2786
Oracle Outside In Technology
Outside In Filters
HTTP
Yes
7.3
Network
Low
None
None
Un-
changed
Low
Low
Low
8.5.4
See Note 1
CVE-2020-2787
Oracle Outside In Technology
Outside In Filters
HTTP
Yes
7.3
Network
Low
None
None
Un-
changed
Low
Low
Low
8.5.4
See Note 1
CVE-2020-2798
Oracle WebLogic Server
WLS Web Services
IIOP, T3
No
7.2
Network
Low
High
None
Un-
changed
High
High
High
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2020-2952
Oracle HTTP Server
Web Listener
HTTP
Yes
6.5
Network
Low
None
None
Un-
changed
Low
Low
None
11.1.1.9.0
CVE-2018-20622
Oracle Outside In Technology
Installation (JasPer)
HTTP
Yes
6.5
Network
Low
None
Required
Un-
changed
None
None
High
8.5.4
See Note 1
CVE-2019-11358
Oracle Big Data Discovery
Studio (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
1.6
CVE-2019-11358
Oracle Fusion Middleware MapViewer
Install (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
12.2.1.3.0
CVE-2019-11358
Oracle WebCenter Sites
Advanced UI (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
12.2.1.3.0
CVE-2020-2811
Oracle WebLogic Server
Console
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2019-12415
Oracle Big Data Discovery
Studio (Apache POI)
None
No
5.5
Local
Low
Low
None
Un-
changed
High
None
None
1.6
CVE-2020-2747
Oracle Access Manager
SSO Engine
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
11.1.2.3.0, 12.2.1.3.0
CVE-2020-2949
Oracle Coherence
Caching, CacheStore, Invocation
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2019-10247
Oracle Endeca Information Discovery Integrator
Integrator ETL (Eclipse Jetty)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
3.2.0
CVE-2020-2783
Oracle Outside In Technology
Outside In Filters
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
None
Low
None
8.5.4
See Note 1
CVE-2019-10247
Oracle Unified Directory
OpenDS SDK (Eclipse Jetty)
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
12.2.1.3.0, 12.2.1.4.0
CVE-2020-2766
Oracle WebLogic Server
Console
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2020-2829
Oracle WebLogic Server
Management Services
HTTP
No
4.9
Network
Low
High
None
Un-
changed
High
None
None
10.3.6.0.0
CVE-2019-1547
Oracle API Gateway
Oracle API Gateway (OpenSSL)
None
No
4.7
Local
High
Low
None
Un-
changed
High
None
None
11.1.2.4.0
CVE-2019-1547
Oracle Endeca Server
Product Code (OpenSSL)
None
No
4.7
Local
High
Low
None
Un-
changed
High
None
None
7.7.0
CVE-2020-2740
Oracle Access Manager
Authentication Engine
HTTP
No
4.6
Network
Low
Low
Required
Un-
changed
Low
Low
None
11.1.2.3.0, 12.2.1.3.0
CVE-2020-2745
Oracle Access Manager
Federation
HTTP
Yes
4.3
Network
Low
None
Required
Un-
changed
None
None
Low
11.1.2.3.0, 12.2.1.3.0
CVE-2020-2869
Oracle WebLogic Server
Console
HTTP
Yes
4.3
Network
Low
None
Required
Un-
changed
None
Low
None
10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0
Notes:
- Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower.
- The patch for this issue will address the vulnerability only if the WLS instance is using JDK 1.7.0_191 or later, or JDK 1.8.0_181 or later.
Additional CVEs addressed are below:
- The patch for CVE-2016-10328 also addresses CVE-2016-10244, CVE-2017-7857, CVE-2017-7858, CVE-2017-7864, CVE-2017-8105, CVE-2017-8287 and CVE-2018-6942.
- The patch for CVE-2018-20622 also addresses CVE-2017-13745, CVE-2017-14232, CVE-2018-18873, CVE-2018-19139, CVE-2018-19539, CVE-2018-19540, CVE-2018-19541, CVE-2018-19542, CVE-2018-19543, CVE-2018-20570, CVE-2018-20584, CVE-2018-9055, CVE-2018-9154 and CVE-2018-9252.
- The patch for CVE-2019-0222 also addresses CVE-2018-11775.
- The patch for CVE-2019-10088 also addresses CVE-2019-10093 and CVE-2019-10094.
- The patch for CVE-2019-10247 also addresses CVE-2019-10246.
- The patch for CVE-2019-13990 also addresses CVE-2019-5427.
- The patch for CVE-2019-1547 also addresses CVE-2019-1549, CVE-2019-1552 and CVE-2019-1563.
- The patch for CVE-2019-16168 also addresses CVE-2018-20346, CVE-2018-20506 and CVE-2019-8457.
- The patch for CVE-2019-16943 also addresses CVE-2019-16942 and CVE-2019-17531.
- The patch for CVE-2019-17571 also addresses CVE-2017-5645.
- The patch for CVE-2020-2798 also addresses CVE-2020-2963.
Oracle GraalVM Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle GraalVM. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-15606
Oracle GraalVM Enterprise Edition
JavaScript (Node.js)
Multiple
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
19.3.1, 20.0.0
CVE-2020-2803
Oracle GraalVM Enterprise Edition
Java
Multiple
Yes
8.3
Network
High
None
Required
Changed
High
High
High
19.3.1, 20.0.0
CVE-2020-2802
Oracle GraalVM Enterprise Edition
GraalVM Compiler
Multiple
No
7.7
Network
Low
Low
None
Changed
None
None
High
19.3.1, 20.0.0
CVE-2020-2799
Oracle GraalVM Enterprise Edition
GraalVM Compiler
Multiple
No
6.3
Network
High
Low
None
Changed
None
High
None
19.3.1, 20.0.0
CVE-2020-2900
Oracle GraalVM Enterprise Edition
Tools
Multiple
No
3.7
Network
High
Low
Required
Un-
changed
Low
Low
None
19.3.1, 20.0.0
Additional CVEs addressed are below:
- The patch for CVE-2019-15606 also addresses CVE-2019-15604 and CVE-2019-15605.
Oracle Health Sciences Applications Risk Matrix
This Critical Patch Update contains 2 new security patches for Oracle Health Sciences Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-17091
Oracle Health Sciences Information Manager
Policy Engine (Eclipse Mojarra)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
3.0
CVE-2019-17091
Oracle Healthcare Data Repository
Installation (Eclipse Mojarra)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
7.0
Oracle Hyperion Risk Matrix
This Critical Patch Update contains 3 new security patches for Oracle Hyperion. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2777
Hyperion Financial Management
Security
HTTP
No
4.2
Network
High
High
Required
Un-
changed
None
High
None
11.1.2.4
CVE-2019-2899
Hyperion Financial Management
Security (Application Development Framework)
HTTP
No
2.4
Network
Low
High
Required
Un-
changed
Low
None
None
11.1.2.4
CVE-2020-2769
Hyperion Financial Reporting
Web Based Report Designer
HTTP
No
2.4
Network
Low
High
Required
Un-
changed
Low
None
None
11.1.2.4
Oracle Java SE Risk Matrix
This Critical Patch Update contains 15 new security patches for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2803
Java SE, Java SE Embedded
Libraries
Multiple
Yes
8.3
Network
High
None
Required
Changed
High
High
High
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 1
CVE-2020-2805
Java SE, Java SE Embedded
Libraries
Multiple
Yes
8.3
Network
High
None
Required
Changed
High
High
High
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 1
CVE-2019-18197
Java SE
JavaFX (libxslt)
Multiple
Yes
8.1
Network
High
None
None
Un-
changed
High
High
High
Java SE: 8u241
See Note 1
CVE-2020-2816
Java SE
JSSE
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
None
High
None
Java SE: 11.0.6, 14
See Note 2
CVE-2020-2781
Java SE, Java SE Embedded
JSSE
HTTPS
Yes
5.3
Network
Low
None
None
Un-
changed
None
None
Low
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
CVE-2020-2830
Java SE, Java SE Embedded
Concurrency
Multiple
Yes
5.3
Network
Low
None
None
Un-
changed
None
None
Low
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
CVE-2020-2767
Java SE
JSSE
HTTPS
Yes
4.8
Network
High
None
None
Un-
changed
Low
Low
None
Java SE: 11.0.6, 14
See Note 3
CVE-2020-2800
Java SE, Java SE Embedded
Lightweight HTTP Server
Multiple
Yes
4.8
Network
High
None
None
Un-
changed
Low
Low
None
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 2
CVE-2020-2778
Java SE
JSSE
HTTPS
Yes
3.7
Network
High
None
None
Un-
changed
Low
None
None
Java SE: 11.0.6, 14
See Note 3
CVE-2020-2764
Java SE
Advanced Management Console
Multiple
Yes
3.7
Network
High
None
None
Un-
changed
Low
None
None
Java Advanced Management Console: 2.16
See Note 2
CVE-2020-2754
Java SE, Java SE Embedded
Scripting
Multiple
Yes
3.7
Network
High
None
None
Un-
changed
None
None
Low
Java SE: 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
CVE-2020-2755
Java SE, Java SE Embedded
Scripting
Multiple
Yes
3.7
Network
High
None
None
Un-
changed
None
None
Low
Java SE: 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
CVE-2020-2773
Java SE, Java SE Embedded
Security
Multiple
Yes
3.7
Network
High
None
None
Un-
changed
None
None
Low
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
CVE-2020-2756
Java SE, Java SE Embedded
Serialization
Multiple
Yes
3.7
Network
High
None
None
Un-
changed
None
None
Low
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
CVE-2020-2757
Java SE, Java SE Embedded
Serialization
Multiple
Yes
3.7
Network
High
None
None
Un-
changed
None
None
Low
Java SE: 7u251, 8u241, 11.0.6, 14; Java SE Embedded: 8u241
See Note 3
Notes:
- This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
- This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.
- Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Oracle JD Edwards Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle JD Edwards. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2733
JD Edwards EnterpriseOne Tools
Monitoring and Diagnostics
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
9.2
CVE-2018-11058
JD Edwards EnterpriseOne Tools
Enterprise Infrastructure Security (Oracle Security Service)
JDENET
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
9.2
CVE-2019-1547
JD Edwards EnterpriseOne Tools
Enterprise Infrastructure Security (OpenSSL)
None
No
4.7
Local
High
Low
None
Un-
changed
High
None
None
9.2
CVE-2019-1547
JD Edwards World Security
World Software Security (OpenSSL)
None
No
4.7
Local
High
Low
None
Un-
changed
High
None
None
A9.3, A9.3.1, A9.4
Additional CVEs addressed are below:
- The patch for CVE-2018-11058 also addresses CVE-2016-0701, CVE-2016-2183, CVE-2016-6306, CVE-2016-8610, CVE-2018-11054, CVE-2018-11055, CVE-2018-11056, CVE-2018-11057 and CVE-2018-15769.
- The patch for CVE-2019-1547 also addresses CVE-2019-1549, CVE-2019-1552 and CVE-2019-1563.
Oracle Knowledge Risk Matrix
This Critical Patch Update contains 16 new security patches for Oracle Knowledge. 15 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2791
Oracle Knowledge
Information Manager Console
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.6.0-8.6.2
CVE-2016-1000031
Oracle Knowledge
Information Manager Console, Web Applications - InfoCenter (Apache Commons FileUpload)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.6.0-8.6.3
CVE-2020-2931
Oracle Knowledge
Web Applications - InfoCenter
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.6.0-8.6.3
CVE-2015-1832
Oracle Knowledge
Web Applications - InfoCenter (Apache Derby)
HTTP
Yes
9.1
Network
Low
None
None
Un-
changed
High
None
High
8.6.0-8.6.3
CVE-2019-0227
Oracle Knowledge
Information Manager Console (Apache Axis)
HTTP
Yes
8.1
Network
High
None
None
Un-
changed
High
High
High
8.6.0-8.6.3
CVE-2016-3092
Oracle Knowledge
Web Applications - InfoCenter (Apache Commons Fileupload)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.6.0-8.6.3
CVE-2015-0254
Oracle Knowledge
Information Manager Console (Apache Standard Taglibs)
HTTP
Yes
7.3
Network
Low
None
None
Un-
changed
Low
Low
Low
8.6.0-8.6.1
CVE-2018-17197
Oracle Knowledge
Information Manager Console (Apache Tika)
HTTP
Yes
6.5
Network
Low
None
Required
Un-
changed
None
None
High
8.6.0-8.6.3
CVE-2020-2795
Oracle Knowledge
Information Manager Console
None
No
6.3
Local
High
High
Required
Un-
changed
High
High
High
8.6.0-8.6.2
CVE-2019-11358
Oracle Knowledge
Answer Flow (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.6.0-8.6.3
CVE-2015-9251
Oracle Knowledge
Information Manager Console, Web Applications - InfoCenter (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.6.0-8.6.3
CVE-2017-14735
Oracle Knowledge
Web Applications - InfoCenter (AntiSamy)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.6.0-8.6.3
CVE-2020-2524
Oracle Knowledge
InQuira Search
HTTP
Yes
5.9
Network
High
None
None
Un-
changed
None
None
High
8.6.0-8.6.3
CVE-2020-2932
Oracle Knowledge
Information Manager Console
HTTP
Yes
5.9
Network
High
None
None
Un-
changed
None
None
High
8.6.0-8.6.3
CVE-2020-2553
Oracle Knowledge
Information Manager Console
HTTP
Yes
4.8
Network
High
None
None
Un-
changed
Low
Low
None
8.6.0-8.6.3
CVE-2020-2522
Oracle Knowledge
Information Manager Console
HTTP
Yes
4.3
Network
Low
None
Required
Un-
changed
None
Low
None
8.6.0-8.6.1
Oracle MySQL Risk Matrix
This Critical Patch Update contains 45 new security patches for Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-5482
MySQL Server
Server: Compiling (cURL)
MySQL Protocol
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
5.7.28 and prior, 8.0.18 and prior
CVE-2019-19646
MySQL Workbench
MySQL Workbench (SQLite)
MySQL Workbench
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
8.0.19 and prior
CVE-2019-14889
MySQL Workbench
MySQL Workbench (libssh)
MySQL Workbench
No
8.0
Network
Low
Low
Required
Un-
changed
High
High
High
8.0.19 and prior
CVE-2019-17563
MySQL Enterprise Monitor
Service Manager (Apache Tomcat)
HTTPS
Yes
7.5
Network
High
None
Required
Un-
changed
High
High
High
8.0.18.1217 and prior, 4.0.11.5331 and prior
CVE-2019-15601
MySQL Server
Server: Compiling (cURL)
MySQL Protocol
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
5.7.29 and prior, 8.0.19 and prior
CVE-2019-15601
MySQL Workbench
MySQL Workbench (cURL)
MySQL Workbench
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
8.0.19 and prior
CVE-2020-2780
MySQL Server
Server: DML
MySQL Protocol
No
6.5
Network
Low
Low
None
Un-
changed
None
None
High
5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior
CVE-2020-2790
MySQL Server
Server: Pluggable Auth
MySQL Protocol
No
6.5
Network
Low
Low
None
Un-
changed
None
None
High
5.7.28 and prior
CVE-2020-2768
MySQL Cluster
Cluster: General
Multiple
No
6.3
Network
Low
Low
Required
Un-
changed
None
Low
High
7.3.28 and prior, 7.4.27 and prior, 7.5.17 and prior, 7.6.13 and prior, 8.0.19 and prior
CVE-2020-2804
MySQL Server
Server: Memcached
Memcached Protocol
Yes
5.9
Network
High
None
None
Un-
changed
None
None
High
5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior
CVE-2020-2760
MySQL Server
InnoDB
MySQL Protocol
No
5.5
Network
Low
High
None
Un-
changed
None
Low
High
5.7.29 and prior, 8.0.19 and prior
CVE-2020-2752
MySQL Client
C API
MySQL Protocol
No
5.3
Network
High
Low
None
Un-
changed
None
None
High
5.6.47 and prior, 5.7.27 and prior, 8.0.17 and prior
CVE-2020-2806
MySQL Server
Server: Compiling
MySQL Protocol
No
5.3
Network
High
Low
None
Un-
changed
None
None
High
5.7.28 and prior
CVE-2020-2934
MySQL Connectors
Connector/J
MySQL Protocol
Yes
5.0
Network
High
None
Required
Un-
changed
Low
Low
Low
8.0.19 and prior, 5.1.48 and prior
CVE-2020-2762
MySQL Server
InnoDB
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2814
MySQL Server
InnoDB
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
5.6.47 and prior, 5.7.28 and prior, 8.0.18 and prior
CVE-2020-2893
MySQL Server
InnoDB
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2895
MySQL Server
InnoDB
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2898
MySQL Server
Server: Charsets
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19
CVE-2020-2903
MySQL Server
Server: Connection Handling
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2896
MySQL Server
Server: Information Schema
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2770
MySQL Server
Server: Logging
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.18 and prior
CVE-2020-2765
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
5.7.29 and prior, 8.0.19 and prior
CVE-2020-2892
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2897
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2923
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2924
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2901
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2928
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2904
MySQL Server
Server: Optimizer
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2925
MySQL Server
Server: PS
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2759
MySQL Server
Server: Replication
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2763
MySQL Server
Server: Replication
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior
CVE-2020-2761
MySQL Server
Server: Security: Privileges
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.18 and prior
CVE-2020-2774
MySQL Server
Server: Security: Privileges
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.18 and prior
CVE-2020-2853
MySQL Server
Server: Security: Privileges
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.18 and prior
CVE-2020-2779
MySQL Server
Server: Security: Privileges
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
8.0.18 and prior
CVE-2020-2812
MySQL Server
Server: Stored Procedure
MySQL Protocol
No
4.9
Network
Low
High
None
Un-
changed
None
None
High
5.6.47 and prior, 5.7.29 and prior, 8.0.19 and prior
CVE-2020-2875
MySQL Connectors
Connector/J
MySQL Protocol
Yes
4.7
Network
High
None
Required
Changed
Low
Low
None
8.0.14 and prior, 5.1.48 and prior
CVE-2019-1547
MySQL Server
Server: Packaging (OpenSSL)
MySQL Protocol
No
4.7
Local
High
Low
None
Un-
changed
High
None
None
5.6.46 and prior, 5.7.26 and prior, 8.0.18 and prior
CVE-2020-2926
MySQL Server
Server: Group Replication GCS
MySQL Protocol
No
4.4
Network
High
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2921
MySQL Server
Server: Group Replication Plugin
MySQL Protocol
No
4.4
Network
High
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2930
MySQL Server
Server: Parser
MySQL Protocol
No
4.4
Network
High
High
None
Un-
changed
None
None
High
8.0.19 and prior
CVE-2020-2922
MySQL Client
C API
MySQL Protocol
Yes
3.7
Network
High
None
None
Un-
changed
Low
None
None
5.6.47 and prior, 5.7.29 and prior, 8.0.18 and prior
CVE-2020-2933
MySQL Connectors
Connector/J
MySQL Protocol
No
2.2
Network
High
High
None
Un-
changed
None
None
Low
5.1.48 and prior
Additional CVEs addressed are below:
- The patch for CVE-2019-1547 also addresses CVE-2019-1549, CVE-2019-1552 and CVE-2019-1563.
- The patch for CVE-2019-19646 also addresses CVE-2019-19242, CVE-2019-19244, CVE-2019-19317, CVE-2019-19603, CVE-2019-19645, CVE-2019-19880, CVE-2019-19923, CVE-2019-19924, CVE-2019-19925, CVE-2019-19926, CVE-2019-19959 and CVE-2019-20218.
- The patch for CVE-2019-5482 also addresses CVE-2019-5481.
Oracle PeopleSoft Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle PeopleSoft. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2776
PeopleSoft Enterprise PeopleTools
Security
HTTP
Yes
8.6
Network
Low
None
None
Changed
None
None
High
8.56, 8.57
CVE-2019-0227
PeopleSoft Enterprise PeopleTools
Tools Admin API (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
8.56, 8.57, 8.58
CVE-2020-2859
PeopleSoft Enterprise PeopleTools
nVision
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.56, 8.57, 8.58
CVE-2019-17359
PeopleSoft Enterprise PeopleTools
Security (Bouncy Castle Java Library)
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
8.56, 8.57, 8.58
CVE-2020-2782
PeopleSoft Enterprise PeopleTools
Query
HTTP
Yes
7.1
Network
Low
None
Required
Changed
Low
Low
Low
8.56, 8.57, 8.58
CVE-2020-2906
PeopleSoft Enterprise SCM Purchasing
Supplier Change
HTTP
No
6.5
Network
Low
Low
None
Un-
changed
High
None
None
9.2
CVE-2020-2954
PeopleSoft Enterprise HRMS
Candidate Gateway
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
9.2
CVE-2020-2868
PeopleSoft Enterprise PeopleTools
Diagnostic Framework
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.56, 8.57, 8.58
CVE-2020-2751
PeopleSoft Enterprise PeopleTools
Portal
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.56, 8.57
CVE-2020-2797
PeopleSoft Enterprise PeopleTools
Process Scheduler
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
8.56, 8.57, 8.58
CVE-2020-2775
PeopleSoft Enterprise PeopleTools
Portal
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
8.56, 8.57, 8.58
CVE-2020-2912
PeopleSoft Enterprise CS Campus Community
Self-Service
HTTP
No
5.0
Network
Low
Low
None
Changed
Low
None
None
9.2
CVE-2020-2899
PeopleSoft Enterprise SCM Purchasing
Purchasing
HTTP
No
4.8
Network
Low
High
Required
Changed
Low
Low
None
9.2
CVE-2020-2947
PeopleSoft Enterprise HCM Absence Management
Absence Management
HTTP
No
4.3
Network
Low
Low
None
Un-
changed
None
Low
None
9.2
Oracle Retail Applications Risk Matrix
This Critical Patch Update contains 27 new security patches for Oracle Retail Applications. 17 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2017-5645
Oracle Retail Advanced Inventory Planning
AIP Dashboard (Apache Ant)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
14.0, 15.0
CVE-2019-13990
Oracle Retail Back Office
Security (Apache Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
14.1
CVE-2019-13990
Oracle Retail Central Office
Security (Apache Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
14.1
CVE-2020-2953
Oracle Retail Customer Management and Segmentation Foundation
Promotions
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
18.0
CVE-2019-13990
Oracle Retail Order Broker
Order Broker Foundation (Apache Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
15.0, 16.0, 18.0, 19.0
CVE-2019-13990
Oracle Retail Point-of-Service
Security (Apache Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
14.1
CVE-2018-11058
Oracle Retail Predictive Application Server
RPAS Server (Oracle Security Service)
Multiple
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
15.0.3, 16.0.3
CVE-2019-13990
Oracle Retail Returns Management
Security (Apache Quartz)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
14.1
CVE-2019-2880
Oracle Retail Store Inventory Management
Security
HTTP
No
8.8
Network
Low
Low
None
Un-
changed
High
High
High
16.0
CVE-2019-17563
MICROS Relate CRM Software
Segments (Apache Tomcat)
HTTP
Yes
7.5
Network
High
None
Required
Un-
changed
High
High
High
11.4
CVE-2019-17563
Oracle Retail Order Broker
System Administration (Apache Tomcat)
HTTP
Yes
7.5
Network
High
None
Required
Un-
changed
High
High
High
15.0
CVE-2020-5398
Oracle Retail Order Broker
System Administration (Spring Framework)
HTTP
Yes
7.5
Network
High
None
Required
Un-
changed
High
High
High
15.0, 16.0
CVE-2017-5533
Oracle Retail Xstore Point of Service
Point of Sale (JasperReports)
HTTP
No
7.5
Network
High
Low
None
Un-
changed
High
High
High
15.0
CVE-2019-0227
Oracle Retail Xstore Point of Service
Xenvironment (Apache Axis)
HTTP
Yes
7.5
Adjacent
Network
High
None
None
Un-
changed
High
High
High
7.1
CVE-2019-17359
Oracle Retail Xstore Point of Service
Xenvironment (Bouncy Castle Java Library)
HTTPS
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
18.0.1
CVE-2017-12626
Oracle Retail Xstore Point of Service
Xenvironment (Apache POI)
HTTP
Yes
6.5
Network
Low
None
None
Un-
changed
Low
Low
None
7.1
CVE-2019-17091
Oracle Retail Advanced Inventory Planning
AIP Dashboard (Eclipse Mojarra)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
15.0, 16.0
CVE-2019-17091
Oracle Retail Merchandising System
Inventory Tracking (Eclipse Mojarra)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
16.0
CVE-2018-10237
Oracle Retail Xstore Point of Service
Xstore Office (Google Guava)
HTTP
Yes
5.9
Network
High
None
None
Un-
changed
None
None
High
7.1, 15.0, 16.0, 17.0
CVE-2017-3160
Oracle Retail Xstore Point of Service
Xstore Services (Apache Cordova)
None
No
4.2
Local
High
Low
Required
Un-
changed
Low
Low
Low
15.0
CVE-2019-10173
Oracle Retail Xstore Point of Service
Point of Sale (xstream)
HTTP
No
3.9
Network
High
High
Required
Un-
changed
Low
Low
Low
17.0
CVE-2019-10086
Oracle Retail Xstore Point of Service
Xenvironment (Apache Commons)
HTTP
No
3.9
Network
High
High
Required
Un-
changed
Low
Low
Low
7.1, 15.0, 16.0, 17.0, 18.0
CVE-2019-10072
Oracle Retail Xstore Point of Service
Xstore Services (Apache Tomcat)
HTTP
No
3.9
Network
High
High
Required
Un-
changed
Low
Low
Low
15.0, 16.0, 17.0, 18.0
CVE-2018-1258
Oracle Retail Xstore Point of Service
Xenvironment (jackson-databind)
HTTP
No
3.7
Network
High
Low
Required
Un-
changed
Low
None
Low
17.0
CVE-2019-10082
Oracle Retail Xstore Point of Service
Xstore Office (Apache HTTP Server)
HTTP
No
3.3
Network
High
High
None
Un-
changed
Low
None
Low
7.1
CVE-2018-11797
Oracle Retail Xstore Point of Service
Dataloader (Apache pdfbox)
HTTP
No
3.1
Network
High
High
Required
Un-
changed
Low
None
Low
17.0
CVE-2018-10237
Oracle Retail Xstore Point of Service
Xstore Services (Google Guava)
HTTP
No
3.1
Network
High
High
Required
Un-
changed
Low
Low
None
17.0
Additional CVEs addressed are below:
- The patch for CVE-2017-5533 also addresses CVE-2017-5529.
- The patch for CVE-2018-11058 also addresses CVE-2016-0701, CVE-2016-2183, CVE-2016-6306, CVE-2016-8610, CVE-2018-11054, CVE-2018-11055, CVE-2018-11056, CVE-2018-11057 and CVE-2018-15769.
- The patch for CVE-2018-11797 also addresses CVE-2018-8036 and CVE-2019-0228.
- The patch for CVE-2019-0227 also addresses CVE-2018-8032.
- The patch for CVE-2019-10072 also addresses CVE-2017-15706, CVE-2018-11784, CVE-2018-1304, CVE-2018-1305, CVE-2018-1336, CVE-2018-8014, CVE-2018-8034, CVE-2018-8037, CVE-2019-0199, CVE-2019-0221 and CVE-2019-0232.
- The patch for CVE-2019-10082 also addresses CVE-2019-10081, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098 and CVE-2019-9517.
- The patch for CVE-2019-13990 also addresses CVE-2019-5427.
- The patch for CVE-2020-5398 also addresses CVE-2020-5397.
Oracle Siebel CRM Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Siebel CRM. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2738
Siebel UI Framework
EAI, SWSE
HTTP
No
4.3
Network
Low
Low
None
Un-
changed
Low
None
None
20.2 and prior
Oracle Supply Chain Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle Supply Chain. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2017-5645
Oracle In-Memory Performance-Driven Planning
User Interface (Log4j)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
12.1, 12.2
CVE-2020-2920
Oracle Agile PLM
Security
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
9.3.3, 9.3.5, 9.3.6
CVE-2020-2744
Oracle Transportation Management
Security
HTTP
No
5.4
Network
Low
Low
Required
Changed
Low
Low
None
6.3.7, 6.4.2, 6.4.3
CVE-2020-2865
Oracle Configurator
Installation
HTTP
Yes
5.3
Network
Low
None
None
Un-
changed
Low
None
None
12.1, 12.2
Oracle Support Tools Risk Matrix
This Critical Patch Update contains 2 new security patches for Oracle Support Tools. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-5482
OSS Support Tools
Services Tools Bundle (cURL)
Multiple
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
20.0
CVE-2019-15601
OSS Support Tools
Services Tools Bundle (cURL)
Multiple
Yes
7.5
Network
Low
None
None
Un-
changed
High
None
None
20.1
Additional CVEs addressed are below:
- The patch for CVE-2019-5482 also addresses CVE-2019-5435, CVE-2019-5436, CVE-2019-5443 and CVE-2019-5481.
Oracle Systems Risk Matrix
This Critical Patch Update contains 9 new security patches for Oracle Systems. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2019-2729
StorageTek Tape Analytics SW Tool
Application Server (Oracle WebLogic Server)
HTTP
Yes
9.8
Network
Low
None
None
Un-
changed
High
High
High
2.3.0
CVE-2020-2944
Oracle Solaris
Common Desktop Environment
None
No
8.8
Local
Low
Low
None
Changed
High
High
High
10, 11
CVE-2020-2927
Oracle Solaris
Common Desktop Environment
None
No
7.8
Local
High
Low
None
Changed
High
High
High
10, 11
CVE-2020-2851
Oracle Solaris
Common Desktop Environment
None
No
7.8
Local
High
Low
None
Changed
High
High
High
10, 11
CVE-2018-1165
Oracle Solaris
SMB Server Kernel Module
None
No
7.0
Local
High
Low
None
Un-
changed
High
High
High
11
CVE-2018-1165
Oracle ZFS Storage Appliance Kit
Operating System Image
Multiple
No
7.0
Local
High
Low
None
Un-
changed
High
High
High
8.8
CVE-2019-11358
StorageTek Tape Analytics SW Tool
Software (jQuery)
HTTP
Yes
6.1
Network
Low
None
Required
Changed
Low
Low
None
2.3.0
CVE-2020-2749
Oracle Solaris
SMF command svcbundle
None
No
2.5
Local
High
Low
Required
Changed
None
Low
None
11
CVE-2020-2771
Oracle Solaris
Whodo
None
No
2.5
Local
High
Low
Required
Changed
Low
None
None
10, 11
Additional CVEs addressed are below:
- The patch for CVE-2018-1165 also addresses CVE-2016-6489, CVE-2017-5754, CVE-2018-0732, CVE-2018-0734, CVE-2018-0737, CVE-2018-18227, CVE-2018-19622, CVE-2018-19623, CVE-2018-19624, CVE-2018-19625, CVE-2018-19626, CVE-2018-19627, CVE-2018-19628, CVE-2018-5407, CVE-2019-12387, CVE-2019-12855, CVE-2019-13057, CVE-2019-13565, CVE-2019-16056, CVE-2019-16168, CVE-2019-19269, CVE-2019-19553, CVE-2019-2412, CVE-2019-2878, CVE-2019-3008, CVE-2019-9579, CVE-2020-2558, CVE-2020-2578, CVE-2020-2680, CVE-2020-2749 and CVE-2020-7044.
- The patch for CVE-2019-2729 also addresses CVE-2019-2725.
Oracle Utilities Applications Risk Matrix
This Critical Patch Update contains 2 new security patches for Oracle Utilities Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2018-1000632
Oracle Utilities Framework
Common (Dom4J)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
2.2.0, 4.2.0.2, 4.2.0.3, 4.3.0.2 - 4.3.0.6, 4.4.0.0, 4.4.0.2
CVE-2017-12626
Oracle Utilities Network Management System
Upload (Apache POI)
HTTP
Yes
7.5
Network
Low
None
None
Un-
changed
None
None
High
1.12.0.3, 2.3.0.1, 2.3.0.2, 2.4.0.0
Oracle Virtualization Risk Matrix
This Critical Patch Update contains 20 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
CVE#
Product
Component
Protocol
Remote
Exploit
without
Auth.?
CVSS VERSION 3.0 RISK (see Risk Matrix Definitions)
Supported Versions Affected
Notes
Base
Score
Attack
Vector
Attack
Complex
Privs
Req’d
User
Interact
Scope
Confid-
entiality
Inte-
grity
Avail-
ability
CVE-2020-2902
Oracle VM VirtualBox
Core
None
No
8.8
Local
Low
Low
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2959
Oracle VM VirtualBox
Core
MLD
Yes
8.6
Network
Low
None
None
Changed
None
None
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2742
Oracle VM VirtualBox
Core
None
No
8.2
Local
Low
High
None
Changed
High
High
High
Prior to 5.2.36, prior to 6.0.16, prior to 6.1.2
CVE-2020-2905
Oracle VM VirtualBox
Core
None
No
8.2
Local
Low
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2908
Oracle VM VirtualBox
Core
None
No
8.2
Local
Low
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2758
Oracle VM VirtualBox
Core
None
No
8.2
Local
Low
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2929
Oracle VM VirtualBox
Core
None
No
7.8
Local
Low
Low
None
Un-
changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2575
Oracle VM VirtualBox
Core
None
No
7.5
Local
High
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2911
Oracle VM VirtualBox
Core
None
No
7.5
Local
High
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2907
Oracle VM VirtualBox
Core
None
No
7.5
Local
High
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2958
Oracle VM VirtualBox
Core
None
No
7.5
Local
High
High
None
Changed
High
High
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2913
Oracle VM VirtualBox
Core
None
No
7.0
Local
High
Low
None
Un-
changed
High
High
High
Prior to 6.0.20, prior to 6.1.6
CVE-2020-2914
Oracle VM VirtualBox
Core
None
No
7.0
Local
High
Low
None
Un-
changed
High
High
High
Prior to 6.0.20, prior to 6.1.6
CVE-2020-2910
Oracle VM VirtualBox
Core
None
No
6.5
Local
Low
Low
None
Changed
None
High
None
Prior to 6.0.20, prior to 6.1.6
CVE-2020-2951
Oracle VM VirtualBox
Core
None
No
6.5
Local
Low
Low
None
Changed
None
None
High
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2741
Oracle VM VirtualBox
Core
None
No
6.0
Local
Low
High
None
Changed
High
None
None
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2743
Oracle VM VirtualBox
Core
None
No
6.0
Local
Low
High
None
Changed
High
None
None
Prior to 5.2.36, prior to 6.0.16, prior to 6.1.2
CVE-2020-2894
Oracle VM VirtualBox
Core
None
No
6.0
Local
Low
High
None
Changed
High
None
None
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2748
Oracle VM VirtualBox
Core
None
No
3.2
Local
Low
High
None
Changed
Low
None
None
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
CVE-2020-2909
Oracle VM VirtualBox
Core
None
No
2.8
Local
Low
Low
Required
Un-
changed
None
None
Low
Prior to 5.2.40, prior to 6.0.20, prior to 6.1.6
Why Oracle
- Analyst Reports
- Gartner MQ for ERP Cloud
- Cloud Economics
- Corporate Responsibility
- Diversity and Inclusion
- Security Practices
Learn
- What is cloud computing?
- What is CRM?
- What is Docker?
- What is Kubernetes?
- What is Python?
- What is SaaS?
What’s New
Try Oracle Cloud Free Tier
Oracle Product Navigator
Oracle and Premier League
Oracle and Red Bull Racing Honda
Employee Experience Platform
Oracle Support Rewards
© 2021 Oracle
Site Map
Privacy/Do Not Sell My Info
Ad Choices
Careers
Facebook
Twitter
LinkedIn
YouTube