-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


   #####################################################
  ##  N C S C ~ B E V E I L I G I N G S A D V I E S  ##
 #####################################################

Titel           : Kwetsbaarheden verholpen in Oracle Communications
Advisory ID     : NCSC-2025-0021
Versie          : 1.00
Kans            : medium
CVE ID          : CVE-2022-41727, CVE-2023-4408, CVE-2023-5678,
                  CVE-2023-5981, CVE-2023-6597, CVE-2023-7256,
                  CVE-2023-29407, CVE-2023-29408, CVE-2023-40577,
                  CVE-2023-46218, CVE-2023-46219, CVE-2023-46604,
                  CVE-2023-50868, CVE-2024-0232, CVE-2024-0397,
                  CVE-2024-0450, CVE-2024-1442, CVE-2024-2961,
                  CVE-2024-3596, CVE-2024-4030, CVE-2024-4032,
                  CVE-2024-5535, CVE-2024-6119, CVE-2024-6162,
                  CVE-2024-6232, CVE-2024-7254, CVE-2024-7592,
                  CVE-2024-7885, CVE-2024-8006, CVE-2024-9143,
                  CVE-2024-22195, CVE-2024-24786, CVE-2024-24791,
                  CVE-2024-25638, CVE-2024-25710, CVE-2024-26308,
                  CVE-2024-27309, CVE-2024-28219, CVE-2024-28834,
                  CVE-2024-28835, CVE-2024-28849, CVE-2024-29025,
                  CVE-2024-29131, CVE-2024-29133, CVE-2024-33599,
                  CVE-2024-33600, CVE-2024-33601, CVE-2024-33602,
                  CVE-2024-34064, CVE-2024-34750, CVE-2024-35195,
                  CVE-2024-37370, CVE-2024-37371, CVE-2024-37891,
                  CVE-2024-38475, CVE-2024-38807, CVE-2024-38809,
                  CVE-2024-38816, CVE-2024-38819, CVE-2024-38820,
                  CVE-2024-38827, CVE-2024-38998, CVE-2024-38999,
                  CVE-2024-41817, CVE-2024-45490, CVE-2024-45491,
                  CVE-2024-45492, CVE-2024-47535, CVE-2024-47554,
                  CVE-2024-47561, CVE-2024-47803, CVE-2024-47804,
                  CVE-2024-49766, CVE-2024-49767, CVE-2024-50379,
                  CVE-2024-50602, CVE-2024-53677, CVE-2024-54677,
                  CVE-2024-56337, CVE-2025-21542, CVE-2025-21544,
                  CVE-2025-21554
                  (Details over de kwetsbaarheden kunt u vinden op
                   de Mitre website: https://cve.mitre.org/cve/)
Schade          : high
                  Uncaught Exception
                  Insufficient Verification of Data Authenticity
                  Exposure of Sensitive Information to an Unauthorized
                  Actor
                  NULL Pointer Dereference
                  Stack-based Buffer Overflow
                  Always-Incorrect Control Flow Implementation
                  Unrestricted Upload of File with Dangerous Type
                  Expected Behavior Violation
                  Improper Verification of Cryptographic Signature
                  Missing Cryptographic Step
                  Deserialization of Untrusted Data
                  Use of Weak Hash
                  Uncontrolled Search Path Element
                  Use of Password Hash Instead of Password for
                  Authentication
                  Use of Cryptographically Weak Pseudo-Random Number
                  Generator (PRNG)
                  Uncontrolled Resource Consumption
                  Uncontrolled Recursion
                  Buffer Copy without Checking Size of Input ('Classic
                  Buffer Overflow')
                  Integer Overflow or Wraparound
                  Authentication Bypass by Capture-replay
                  Missing Encryption of Sensitive Data
                  UNIX Symbolic Link (Symlink) Following
                  Allocation of Resources Without Limits or Throttling
                  Return of Pointer Value Outside of Expected Range
                  Incorrect Default Permissions
                  Improper Restriction of Operations within the Bounds
                  of a Memory Buffer
                  Incorrect Authorization
                  Improper Input Validation
                  Insufficient Granularity of Access Control
                  Observable Discrepancy
                  Out-of-bounds Write
                  Use of Potentially Dangerous Function
                  Acceptance of Extraneous Untrusted Data With Trusted
                  Data
                  Use After Free
                  Files or Directories Accessible to External Parties
                  Improper Limitation of a Pathname to a Restricted
                  Directory ('Path Traversal')
                  Improper Encoding or Escaping of Output
                  Dependency on Vulnerable Third-Party Component
                  Concurrent Execution using Shared Resource with
                  Improper Synchronization ('Race Condition')
                  Incorrect Calculation of Buffer Size
                  Improper Resource Shutdown or Release
                  Improper Access Control
                  Improperly Controlled Modification of Object Prototype
                  Attributes ('Prototype Pollution')
                  Inefficient Regular Expression Complexity
                  Generation of Error Message Containing Sensitive
                  Information
                  Relative Path Traversal
                  Improper Validation of Integrity Check Value
                  Integer Overflow to Buffer Overflow
                  Heap-based Buffer Overflow
                  Incorrect Resource Transfer Between Spheres
                  Reachable Assertion
                  Improper Privilege Management
                  Use of a Broken or Risky Cryptographic Algorithm
                  Unchecked Input for Loop Condition
                  Multiple Interpretations of UI Input
                  Improper Handling of Length Parameter Inconsistency
                  Insertion of Sensitive Information Into Sent Data
                  Asymmetric Resource Consumption (Amplification)
                  Improper Check for Unusual or Exceptional Conditions
                  Improper Check or Handling of Exceptional Conditions
                  User Interface (UI) Misrepresentation of Critical
                  Information
                  Improper Restriction of XML External Entity Reference
                  Path Traversal: '.../...//'
                  Improper Enforcement of Message Integrity During
                  Transmission in a Communication Channel
                  Use of Hard-coded Credentials
                  Improper Neutralization of Input During Web Page
                  Generation ('Cross-site Scripting')
                  Improper Handling of Exceptional Conditions
                  Excessive Iteration
                  Improper Handling of Case Sensitivity
                  Time-of-check Time-of-use (TOCTOU) Race Condition
                  Loop with Unreachable Exit Condition ('Infinite Loop')
                  Access of Resource Using Incompatible Type ('Type
                  Confusion')
                  Authorization Bypass Through User-Controlled Key
                  Double Free
Uitgiftedatum   : 20250122
Toepassing      : oracle communications
                  oracle communications__10.4.0.4
                  oracle communications___23.4.2
                  oracle communications___23.4.3
                  oracle communications___23.4.4
                  oracle communications___23.4.5
                  oracle communications___23.4.6
                  oracle communications___24.2.0
                  oracle communications___7.2.1.0.0
                  oracle communications___8.6.0.6
                  oracle communications___8.6.0.8
                  oracle communications___9.0.2
                  oracle communications___9.0.3
                  oracle communications___9.1.1.8.0
                  oracle communications_applications
                  oracle communications_applications___12.0.6.0.0
                  oracle communications_applications___5.5.22
                  oracle communications_applications___6.0.3
                  oracle communications_applications___6.0.4
                  oracle communications_applications___6.0.5
                  oracle communications_asap
                  oracle communications_billing_and_revenue_management
                  oracle communications_brm_-_elastic_charging_engine
                  oracle
                  communications_cloud_native_core_automated_test_suite
                  oracle communications_cloud_native_core_binding_suppor
                  t_function
                  oracle communications_cloud_native_core_certificate_ma
                  nagement
                  oracle communications_cloud_native_core_console
                  oracle communications_cloud_native_core_dbtier
                  oracle communications_cloud_native_core_network_data_a
                  nalytics_function
                  oracle communications_cloud_native_core_network_exposu
                  re_function
                  oracle communications_cloud_native_core_network_functi
                  on_cloud_native_environment
                  oracle communications_cloud_native_core_network_reposi
                  tory_function
                  oracle communications_cloud_native_core_network_slice_
                  selection_function
                  oracle communications_cloud_native_core_policy
                  oracle communications_cloud_native_core_security_edge_
                  protection_proxy
                  oracle communications_cloud_native_core_service_commun
                  ication_proxy
                  oracle communications_cloud_native_core_unified_data_r
                  epository
                  oracle communications_converged_application_server
                  oracle communications_converged_charging_system
                  oracle communications_convergence
                  oracle communications_convergent_charging_controller
                  oracle communications_core_session_manager
                  oracle communications_diameter_signaling_router
                  oracle communications_eagle_element_management_system
                  oracle communications_element_manager
                  oracle communications_fraud_monitor
                  oracle communications_instant_messaging_server
                  oracle communications_ip_service_activator
                  oracle communications_messaging_server
                  oracle communications_metasolv_solution
                  oracle communications_network_analytics_data_director
                  oracle communications_network_charging_and_control
                  oracle communications_network_integrity
                  oracle communications_offline_mediation_controller
                  oracle communications_operations_monitor
                  oracle communications_order_and_service_management
                  oracle communications_performance_intelligence
                  oracle communications_policy_management
                  oracle communications_pricing_design_center
                  oracle communications_service_catalog_and_design
                  oracle communications_session_border_controller
                  oracle communications_session_report_manager
                  oracle communications_unified_assurance
                  oracle communications_unified_inventory_management
                  oracle communications_user_data_repository
                  oracle communications_webrtc_session_controller
Versie(s)       :
Platform(s)     :

Beschrijving
   Oracle heeft meerdere kwetsbaarheden verholpen in zijn
   Communicatieproducten, waaronder Oracle Communications Unified
   Assurance, Oracle Communications Cloud Native Core Network Function
   en Oracle Communications Order and Service Management.

   De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat
   om Denial of Service (DoS) aanvallen uit te voeren of om
   ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen.
   Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core
   Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen
   deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-
   verzoeken te sturen naar het kwetsbare systeem.

Mogelijke oplossingen
   Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen.
   Zie bijgevoegde referenties voor meer informatie.

   Referenties:
      Reference - cveprojectv5; nvd; oracle
      https://www.oracle.com/security-alerts/cpujan2025.html

Vrijwaringsverklaring
   Door gebruik van deze security advisory gaat u akkoord met de
   navolgende voorwaarden. Ondanks dat het NCSC de grootst mogelijke
   zorg heeft betracht bij de samenstelling van dit beveiligingsadvies,
   kan het NCSC niet instaan voor de volledigheid, juistheid of
   (voortdurende) actualiteit van dit beveiligingsadvies. De informatie
   in dit beveiligingsadvies is uitsluitend bedoeld als algemene
   informatie voor professionele partijen. Aan de informatie in dit
   beveiligingsadvies kunnen geen rechten worden ontleend. Het NCSC
   en de Staat zijn niet aansprakelijk voor enige schade ten gevolge
   van het gebruik of de onmogelijkheid van het gebruik van dit
   beveiligingsadvies, waaronder begrepen schade ten gevolge van de
   onjuistheid of onvolledigheid van de informatie in dit
   beveiligingsadvies. Op dit beveiligingsadvies is Nederlands recht
   van toepassing. Alle geschillen in verband met en/of voortvloeiend
   uit dit beveiligingsadvies zullen worden voorgelegd aan de exclusief
   bevoegde rechter te Den Haag. Deze rechtskeuze geldt tevens voor de
   voorzieningenrechter in kort geding.

-----BEGIN PGP SIGNATURE-----
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=7PMm
-----END PGP SIGNATURE-----