Kwetsbaarheden verholpen in Oracle Communications
Deze pagina zet de platte tekst van officiële advisories automatisch
om naar HTML. Hierbij kan mogelijk informatie verloren gaan. De Signed
PGP-versies zijn leidend.
Publicatie |
Kans |
Schade |
|
|
|
Versie 1.00 |
gisteren |
NCSC-2025-0021 |
|
|
medium
|
high
|
Signed-PGP →
CSAF →
PDF →
|
|
gisteren |
medium
|
high
|
NCSC-2025-0021 [1.00] |
Signed-PGP →
Text,
CSAF
(sig),
PDF
|
Kenmerken |
Kenmerken
- Uncaught Exception
- Insufficient Verification of Data Authenticity
- Exposure of Sensitive Information to an Unauthorized Actor
- NULL Pointer Dereference
- Stack-based Buffer Overflow
- Always-Incorrect Control Flow Implementation
- Unrestricted Upload of File with Dangerous Type
- Expected Behavior Violation
- Improper Verification of Cryptographic Signature
- Missing Cryptographic Step
- Deserialization of Untrusted Data
- Use of Weak Hash
- Uncontrolled Search Path Element
- Use of Password Hash Instead of Password for Authentication
- Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- Uncontrolled Resource Consumption
- Uncontrolled Recursion
- Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- Integer Overflow or Wraparound
- Authentication Bypass by Capture-replay
- Missing Encryption of Sensitive Data
- UNIX Symbolic Link (Symlink) Following
- Allocation of Resources Without Limits or Throttling
- Return of Pointer Value Outside of Expected Range
- Incorrect Default Permissions
- Improper Restriction of Operations within the Bounds of a Memory Buffer
- Incorrect Authorization
- Improper Input Validation
- Insufficient Granularity of Access Control
- Observable Discrepancy
- Out-of-bounds Write
- Use of Potentially Dangerous Function
- Acceptance of Extraneous Untrusted Data With Trusted Data
- Use After Free
- Files or Directories Accessible to External Parties
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- Improper Encoding or Escaping of Output
- Dependency on Vulnerable Third-Party Component
- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
- Incorrect Calculation of Buffer Size
- Improper Resource Shutdown or Release
- Improper Access Control
- Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
- Inefficient Regular Expression Complexity
- Generation of Error Message Containing Sensitive Information
- Relative Path Traversal
- Improper Validation of Integrity Check Value
- Integer Overflow to Buffer Overflow
- Heap-based Buffer Overflow
- Incorrect Resource Transfer Between Spheres
- Reachable Assertion
- Improper Privilege Management
- Use of a Broken or Risky Cryptographic Algorithm
- Unchecked Input for Loop Condition
- Multiple Interpretations of UI Input
- Improper Handling of Length Parameter Inconsistency
- Insertion of Sensitive Information Into Sent Data
- Asymmetric Resource Consumption (Amplification)
- Improper Check for Unusual or Exceptional Conditions
- Improper Check or Handling of Exceptional Conditions
- User Interface (UI) Misrepresentation of Critical Information
- Improper Restriction of XML External Entity Reference
- Path Traversal: '.../...//'
- Improper Enforcement of Message Integrity During Transmission in a Communication Channel
- Use of Hard-coded Credentials
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Improper Handling of Exceptional Conditions
- Excessive Iteration
- Improper Handling of Case Sensitivity
- Time-of-check Time-of-use (TOCTOU) Race Condition
- Loop with Unreachable Exit Condition ('Infinite Loop')
- Access of Resource Using Incompatible Type ('Type Confusion')
- Authorization Bypass Through User-Controlled Key
- Double Free
|
Omschrijving |
Omschrijving
Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management. De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.
|
Bereik |
Bereik
Platforms |
Producten |
Versies |
|
oracle communications
oracle communications__10.4.0.4
oracle communications___23.4.2
oracle communications___23.4.3
oracle communications___23.4.4
oracle communications___23.4.5
oracle communications___23.4.6
oracle communications___24.2.0
oracle communications___7.2.1.0.0
oracle communications___8.6.0.6
oracle communications___8.6.0.8
oracle communications___9.0.2
oracle communications___9.0.3
oracle communications___9.1.1.8.0
oracle communications_applications
oracle communications_applications___12.0.6.0.0
oracle communications_applications___5.5.22
oracle communications_applications___6.0.3
oracle communications_applications___6.0.4
oracle communications_applications___6.0.5
oracle communications_asap
oracle communications_billing_and_revenue_management
oracle communications_brm_-_elastic_charging_engine
oracle communications_cloud_native_core_automated_test_suite oracle communications_cloud_native_core_binding_support_function oracle communications_cloud_native_core_certificate_management oracle communications_cloud_native_core_console oracle communications_cloud_native_core_dbtier oracle communications_cloud_native_core_network_data_analytics_function oracle communications_cloud_native_core_network_exposure_function oracle communications_cloud_native_core_network_function_cloud_native_environment oracle communications_cloud_native_core_network_repository_function oracle communications_cloud_native_core_network_slice_selection_function oracle communications_cloud_native_core_policy oracle communications_cloud_native_core_security_edge_protection_proxy oracle communications_cloud_native_core_service_communication_proxy oracle communications_cloud_native_core_unified_data_repository oracle communications_converged_application_server oracle communications_converged_charging_system oracle communications_convergence oracle communications_convergent_charging_controller oracle communications_core_session_manager oracle communications_diameter_signaling_router oracle communications_eagle_element_management_system oracle communications_element_manager oracle communications_fraud_monitor oracle communications_instant_messaging_server oracle communications_ip_service_activator oracle communications_messaging_server oracle communications_metasolv_solution oracle communications_network_analytics_data_director oracle communications_network_charging_and_control oracle communications_network_integrity oracle communications_offline_mediation_controller oracle communications_operations_monitor oracle communications_order_and_service_management oracle communications_performance_intelligence oracle communications_policy_management oracle communications_pricing_design_center oracle communications_service_catalog_and_design oracle communications_session_border_controller oracle communications_session_report_manager oracle communications_unified_assurance oracle communications_unified_inventory_management oracle communications_user_data_repository oracle communications_webrtc_session_controller
|
10.5 - 12.11.0 - 12.11.3 - 12.11.4 - 12.6.1.0.0 - 14.0.0.0.0 - 14.0.0.1 - 14.0 - 15.0.0.0.0 - 17.0.1 - 22.4.0 - 23.1.0 - 23.2.0 - 23.2.2 - 23.3.0 - 23.3.1 - 23.3.2 - 23.4.0 - 23.4.1 - 23.4.2 - 23.4.3 - 23.4.4 - 24.1.0.0.0 - 24.1.0 - 24.1.1 - 24.2.0 - 24.2.1 - 24.2.2 - 4.1.0 - 4.2.0 - 46.6.4 - 46.6.5 - 5.0 - 5.1 - 5.2 - 9.0.0.0 - 9.0.1.10.0 - 9.1.0 - 9.1.1.3.0 - 9.1.1.7.0 - 9.1.1.9.0 - 9.1.5 - 9.2.0 - 9.3.0 - 15.0.0.0.0 - 15.0.0.0 - 15.0.1.0 - 3.0.2.0.0 - 3.0.3.0.0 - 3.0.3.3.0 - 6.0.1.0.0 - 7.4.0 - 7.4.1 - 7.4.2 - 7.4.3.0.2 - 7.5.0 - 8.0.0.3 - 8.1.0.1 - 8.1.0.26 - 8.1 - 7.4 - 12.0.0.4-12.0.0.8 - 15.0.0.0-15.0.0.1 - 15.0.0.0.0 - 15.0.0.0 - 12.0.0.4-12.0.0.8 - 15.0.0.0 - 15.0.1.0 - 23.1.0 - 23.1.3 - 23.2.1 - 23.3.0 - 23.4.0 - 24.2.0 - 23.4.0-23.4.3 - 23.4.0-23.4.5 - 24.2.0 - 24.2.1 - 23.4.2 - 23.4.3 - 24.2.0 - 24.2.1 - 23.3.0 - 23.3.1 - 23.4.0 - 23.4.1 - 23.4.2 - 24.2.0 - 24.2.1 - 24.1.0 - 24.2.0 - 24.3.0 - 23.3.0 - 23.4.0 - 24.1.0 - 24.2.0 - 23.3.1 - 23.4.1 - 23.4.3 - 23.1.0 - 23.2.0 - 23.3.1 - 23.4.0 - 24.1.0 - 24.2.0 - 24.3.0 - _install_upgrade___23.3.1 - _install_upgrade___23.4.0 - _installation___23.4.0 - _obserability_services_overlay___23.4.0 - _observability_services_overlay___23.4.0 - 23.1.4 - 23.3.1 - 23.4.1 - 23.4.2 - 23.4.4 - 24.2.1 - 24.2.2 - _install_upgrade___23.3.1 - _install_upgrade___23.4.1 - 23.2.0 - 23.3.0 - 23.3.1 - 24.2.0 - _install_upgrade___23.2.0 - _install_upgrade___23.3.1 - 23.4.0-23.4.4 - 23.4.0-23.4.5 - 23.4.0-23.4.6 - 23.4.0 - 24.2.0-24.2.2 - 24.2.0 - 24.2.2 - 23.1.0 - 23.2.0 - 23.3.0 - 23.4.0 - 23.4.2 - 24.1.0 - 24.2.0 - 24.2.1 - 24.2.2 - _automated_test_suite___23.3.0 - 23.1.0 - 23.2.2 - 23.3.0 - 23.4.0 - 23.4.1 - 23.4.2 - 24.1.0 - 24.2.0 - 24.3.0 - 22.4.0 - 23.1.0 - 23.2.0 - 23.3.1 - 23.3.2 - 23.4.1 - 23.4.2 - 23.4.4 - 24.1.1 - 24.2.0 - 24.2.2 - 24.2.3 - 24.3.0 - _signaling___23.3.1 - 8.0 - 8.1 - 2.0.0.0.0 - 2.0.0.1.0 - 3.0.2.0.0 - 3.0.3.0.0 - 3.0.3.2 - 3.0.3.3.0 - 3.0.3.3 - 12.0.1.0.0-12.0.6.0.0 - 12.0.6.0.0 - 15.0.0.0.0 - 6.0.1.0.0 - 9.1.5 - 8.2.3.0.0 - 8.6.0.0 - 8.6.0.4.0 - 9.0.0.0.0-9.0.2.0.0 - 9.0.0.0.0 - 9.0.0.0 - 9.0 - _patches___9.0.0.0 - _platform___9.0.0.0 - 46.6.4 - 46.6.5 - 47.0.0.0.0 - 9.0.0.0.0 - 9.0.2.0.1 - 9.4.53 - 5.0 - 5.1 - 5.2 - 10.0.1.7.0 - 7.4.0 - 7.5.0 - 8.1.0.24.0 - 8.1.0.26 - 6.3.1.0.0 - 23.2.0.0.2 - 23.3.0.0.0 - 23.4.0 - 24.1.0 - 24.2.0 - _general___23.2.0.0.2 - _general___23.3.0.0.0 - _install_upgrade___23.2.0.0.2 - _install_upgrade___23.3.0.0.0 - _third_party___23.2.0.0.2 - _third_party___23.3.0.0.0 - 12.0.1.0.0-12.0.6.0.0 - 12.0.6.0.0 - 15.0.0.0.0 - 6.0.1.0.0 - 7.3.6.4 - 12.0.0.8 - 15.0.0.0 - 15.0.1.0 - 5.0 - 5.1 - 5.2 - 7.4.0 - 7.4.1 - 7.5.0 - 10.5 - 12.6.1.0.0 - 15.0.0.0.0 - 15.0.0.0.0 - 7.4.0.7.0 - 7.4.1.5.0 - 7.4.2.8.0 - 8.0.0.1.0 - 8.0.0.3 - 8.0.0 - 8.1.0.1 - _psr_designer___7.4.0.7.0 - _psr_designer___7.4.1.5.0 - _psr_designer___7.4.2.8.0 - 4.1.0 - 4.2.0 - 9.1.0 - 9.2.0 - 9.3.0 - 9.0.0.0.0 - 9.0.2.0.1 - 9.4.53 - 5.5.0-5.5.22 - 6.0.0-6.0.4 - 6.0.0-6.0.5 - 6.0.1-6.0.5 - 6.0.4-6.0.5 - 7.4.0 - 7.4.1 - 7.4.2 - 7.5.0 - 7.5.1 - 12.11.0 - 12.11.3 - 12.11.4 - 12.11 - 14.0.0.0.0 - 14.0 - 15.0
|
|
Oplossingen |
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie. [Link]
|
CVE’s |
CVE’s
CVE-2022-41727, CVE-2023-4408, CVE-2023-5678, CVE-2023-5981, CVE-2023-6597, CVE-2023-7256, CVE-2023-29407, CVE-2023-29408, CVE-2023-40577, CVE-2023-46218, CVE-2023-46219, CVE-2023-46604, CVE-2023-50868, CVE-2024-0232, CVE-2024-0397, CVE-2024-0450, CVE-2024-1442, CVE-2024-2961, CVE-2024-3596, CVE-2024-4030, CVE-2024-4032, CVE-2024-5535, CVE-2024-6119, CVE-2024-6162, CVE-2024-6232, CVE-2024-7254, CVE-2024-7592, CVE-2024-7885, CVE-2024-8006, CVE-2024-9143, CVE-2024-22195, CVE-2024-24786, CVE-2024-24791, CVE-2024-25638, CVE-2024-25710, CVE-2024-26308, CVE-2024-27309, CVE-2024-28219, CVE-2024-28834, CVE-2024-28835, CVE-2024-28849, CVE-2024-29025, CVE-2024-29131, CVE-2024-29133, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34064, CVE-2024-34750, CVE-2024-35195, CVE-2024-37370, CVE-2024-37371, CVE-2024-37891, CVE-2024-38475, CVE-2024-38807, CVE-2024-38809, CVE-2024-38816, CVE-2024-38819, CVE-2024-38820, CVE-2024-38827, CVE-2024-38998, CVE-2024-38999, CVE-2024-41817, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-47535, CVE-2024-47554, CVE-2024-47561, CVE-2024-47803, CVE-2024-47804, CVE-2024-49766, CVE-2024-49767, CVE-2024-50379, CVE-2024-50602, CVE-2024-53677, CVE-2024-54677, CVE-2024-56337, CVE-2025-21542, CVE-2025-21544, CVE-2025-21554
|
|
Versie 1.00 |
gisteren |
NCSC-2025-0021 |
|
|
medium
|
high
|
Signed-PGP →
CSAF →
PDF →
|
|
gisteren |
medium
|
high
|
NCSC-2025-0021 [1.00] |
Signed-PGP →
Text,
CSAF
(sig),
PDF
|
Vrijwaringsverklaring
Door gebruik van deze security advisory gaat u akkoord met de
navolgende voorwaarden. Ondanks dat het NCSC de grootst mogelijke
zorg heeft betracht bij de samenstelling van dit beveiligingsadvies,
kan het NCSC niet instaan voor de volledigheid, juistheid of
(voortdurende) actualiteit van dit beveiligingsadvies. De informatie
in dit beveiligingsadvies is uitsluitend bedoeld als algemene
informatie voor professionele partijen. Aan de informatie in dit
beveiligingsadvies kunnen geen rechten worden ontleend.
Het NCSC en de Staat zijn niet aansprakelijk voor enige schade
ten gevolge van het gebruik of de onmogelijkheid van het gebruik
van dit beveiligingsadvies, waaronder begrepen schade ten gevolge
van de onjuistheid of onvolledigheid van de informatie in dit
beveiligingsadvies.
Op dit beveiligingsadvies is Nederlands recht van toepassing. Alle
geschillen in verband met en/of voortvloeiend uit dit beveiligingsadvies
zullen worden voorgelegd aan de exclusief bevoegde rechter te Den
Haag. Deze rechtskeuze geldt tevens voor de voorzieningenrechter in
kort geding.