#VU52380 Improper input validation in Oracle Database Server

Published: 2021-06-06

Vulnerability identifier: #VU52380

Vulnerability risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2021-2173


Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Oracle Database Server
Server applications / Database software

Vendor: Oracle


The vulnerability allows a remote privileged user to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Recovery in Oracle Database Server. A remote privileged user can exploit this vulnerability to gain access to sensitive information.

Install updates from vendor's website.

Vulnerable software versions

Oracle Database Server: - 19c

External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

Latest bulletins with this vulnerability