CVE-2020-2555

Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
References
Link Resource
http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujan2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2021.html Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2021.html Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:3.7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:healthcare_data_repository:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.1.0:*:*:*:*:*:*:*

History

14 Feb 2025, 16:47

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpujul2021.html - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/cpujul2021.html - Patch, Vendor Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujan2021.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpujan2021.html - Vendor Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpujan2020.html - Vendor Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpujul2020.html - Vendor Advisory
References (N/A) https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory
References (MISC) http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry

02 Oct 2024, 14:24

Type Values Removed Values Added
References (N/A) https://www.oracle.com/security-alerts/cpuoct2020.html - Vendor Advisory (N/A) https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory
First Time Oracle access Manager
CPE cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*

Information

Published : 2020-01-15 17:15

Updated : 2025-02-14 16:47


NVD link : CVE-2020-2555

Mitre link : CVE-2020-2555


JSON object : View

Products Affected

oracle

  • webcenter_portal
  • access_manager
  • utilities_framework
  • communications_diameter_signaling_router
  • coherence
  • healthcare_data_repository
  • commerce_platform
  • retail_assortment_planning
  • rapid_planning
CWE
CWE-502

Deserialization of Untrusted Data