-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ##################################################### ## N C S C ~ B E V E I L I G I N G S A D V I E S ## ##################################################### Titel : Kwetsbaarheden verholpen in Oracle Communications Advisory ID : NCSC-2025-0021 Versie : 1.00 Kans : medium CVE ID : CVE-2022-41727, CVE-2023-4408, CVE-2023-5678, CVE-2023-5981, CVE-2023-6597, CVE-2023-7256, CVE-2023-29407, CVE-2023-29408, CVE-2023-40577, CVE-2023-46218, CVE-2023-46219, CVE-2023-46604, CVE-2023-50868, CVE-2024-0232, CVE-2024-0397, CVE-2024-0450, CVE-2024-1442, CVE-2024-2961, CVE-2024-3596, CVE-2024-4030, CVE-2024-4032, CVE-2024-5535, CVE-2024-6119, CVE-2024-6162, CVE-2024-6232, CVE-2024-7254, CVE-2024-7592, CVE-2024-7885, CVE-2024-8006, CVE-2024-9143, CVE-2024-22195, CVE-2024-24786, CVE-2024-24791, CVE-2024-25638, CVE-2024-25710, CVE-2024-26308, CVE-2024-27309, CVE-2024-28219, CVE-2024-28834, CVE-2024-28835, CVE-2024-28849, CVE-2024-29025, CVE-2024-29131, CVE-2024-29133, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34064, CVE-2024-34750, CVE-2024-35195, CVE-2024-37370, CVE-2024-37371, CVE-2024-37891, CVE-2024-38475, CVE-2024-38807, CVE-2024-38809, CVE-2024-38816, CVE-2024-38819, CVE-2024-38820, CVE-2024-38827, CVE-2024-38998, CVE-2024-38999, CVE-2024-41817, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2024-47535, CVE-2024-47554, CVE-2024-47561, CVE-2024-47803, CVE-2024-47804, CVE-2024-49766, CVE-2024-49767, CVE-2024-50379, CVE-2024-50602, CVE-2024-53677, CVE-2024-54677, CVE-2024-56337, CVE-2025-21542, CVE-2025-21544, CVE-2025-21554 (Details over de kwetsbaarheden kunt u vinden op de Mitre website: https://cve.mitre.org/cve/) Schade : high Uncaught Exception Insufficient Verification of Data Authenticity Exposure of Sensitive Information to an Unauthorized Actor NULL Pointer Dereference Stack-based Buffer Overflow Always-Incorrect Control Flow Implementation Unrestricted Upload of File with Dangerous Type Expected Behavior Violation Improper Verification of Cryptographic Signature Missing Cryptographic Step Deserialization of Untrusted Data Use of Weak Hash Uncontrolled Search Path Element Use of Password Hash Instead of Password for Authentication Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Uncontrolled Resource Consumption Uncontrolled Recursion Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Integer Overflow or Wraparound Authentication Bypass by Capture-replay Missing Encryption of Sensitive Data UNIX Symbolic Link (Symlink) Following Allocation of Resources Without Limits or Throttling Return of Pointer Value Outside of Expected Range Incorrect Default Permissions Improper Restriction of Operations within the Bounds of a Memory Buffer Incorrect Authorization Improper Input Validation Insufficient Granularity of Access Control Observable Discrepancy Out-of-bounds Write Use of Potentially Dangerous Function Acceptance of Extraneous Untrusted Data With Trusted Data Use After Free Files or Directories Accessible to External Parties Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Improper Encoding or Escaping of Output Dependency on Vulnerable Third-Party Component Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Incorrect Calculation of Buffer Size Improper Resource Shutdown or Release Improper Access Control Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Inefficient Regular Expression Complexity Generation of Error Message Containing Sensitive Information Relative Path Traversal Improper Validation of Integrity Check Value Integer Overflow to Buffer Overflow Heap-based Buffer Overflow Incorrect Resource Transfer Between Spheres Reachable Assertion Improper Privilege Management Use of a Broken or Risky Cryptographic Algorithm Unchecked Input for Loop Condition Multiple Interpretations of UI Input Improper Handling of Length Parameter Inconsistency Insertion of Sensitive Information Into Sent Data Asymmetric Resource Consumption (Amplification) Improper Check for Unusual or Exceptional Conditions Improper Check or Handling of Exceptional Conditions User Interface (UI) Misrepresentation of Critical Information Improper Restriction of XML External Entity Reference Path Traversal: '.../...//' Improper Enforcement of Message Integrity During Transmission in a Communication Channel Use of Hard-coded Credentials Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Improper Handling of Exceptional Conditions Excessive Iteration Improper Handling of Case Sensitivity Time-of-check Time-of-use (TOCTOU) Race Condition Loop with Unreachable Exit Condition ('Infinite Loop') Access of Resource Using Incompatible Type ('Type Confusion') Authorization Bypass Through User-Controlled Key Double Free Uitgiftedatum : 20250122 Toepassing : oracle communications oracle communications__10.4.0.4 oracle communications___23.4.2 oracle communications___23.4.3 oracle communications___23.4.4 oracle communications___23.4.5 oracle communications___23.4.6 oracle communications___24.2.0 oracle communications___7.2.1.0.0 oracle communications___8.6.0.6 oracle communications___8.6.0.8 oracle communications___9.0.2 oracle communications___9.0.3 oracle communications___9.1.1.8.0 oracle communications_applications oracle communications_applications___12.0.6.0.0 oracle communications_applications___5.5.22 oracle communications_applications___6.0.3 oracle communications_applications___6.0.4 oracle communications_applications___6.0.5 oracle communications_asap oracle communications_billing_and_revenue_management oracle communications_brm_-_elastic_charging_engine oracle communications_cloud_native_core_automated_test_suite oracle communications_cloud_native_core_binding_suppor t_function oracle communications_cloud_native_core_certificate_ma nagement oracle communications_cloud_native_core_console oracle communications_cloud_native_core_dbtier oracle communications_cloud_native_core_network_data_a nalytics_function oracle communications_cloud_native_core_network_exposu re_function oracle communications_cloud_native_core_network_functi on_cloud_native_environment oracle communications_cloud_native_core_network_reposi tory_function oracle communications_cloud_native_core_network_slice_ selection_function oracle communications_cloud_native_core_policy oracle communications_cloud_native_core_security_edge_ protection_proxy oracle communications_cloud_native_core_service_commun ication_proxy oracle communications_cloud_native_core_unified_data_r epository oracle communications_converged_application_server oracle communications_converged_charging_system oracle communications_convergence oracle communications_convergent_charging_controller oracle communications_core_session_manager oracle communications_diameter_signaling_router oracle communications_eagle_element_management_system oracle communications_element_manager oracle communications_fraud_monitor oracle communications_instant_messaging_server oracle communications_ip_service_activator oracle communications_messaging_server oracle communications_metasolv_solution oracle communications_network_analytics_data_director oracle communications_network_charging_and_control oracle communications_network_integrity oracle communications_offline_mediation_controller oracle communications_operations_monitor oracle communications_order_and_service_management oracle communications_performance_intelligence oracle communications_policy_management oracle communications_pricing_design_center oracle communications_service_catalog_and_design oracle communications_session_border_controller oracle communications_session_report_manager oracle communications_unified_assurance oracle communications_unified_inventory_management oracle communications_user_data_repository oracle communications_webrtc_session_controller Versie(s) : Platform(s) : Beschrijving Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management. De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP- verzoeken te sturen naar het kwetsbare systeem. Mogelijke oplossingen Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie. Referenties: Reference - cveprojectv5; nvd; oracle https://www.oracle.com/security-alerts/cpujan2025.html Vrijwaringsverklaring Door gebruik van deze security advisory gaat u akkoord met de navolgende voorwaarden. Ondanks dat het NCSC de grootst mogelijke zorg heeft betracht bij de samenstelling van dit beveiligingsadvies, kan het NCSC niet instaan voor de volledigheid, juistheid of (voortdurende) actualiteit van dit beveiligingsadvies. De informatie in dit beveiligingsadvies is uitsluitend bedoeld als algemene informatie voor professionele partijen. Aan de informatie in dit beveiligingsadvies kunnen geen rechten worden ontleend. Het NCSC en de Staat zijn niet aansprakelijk voor enige schade ten gevolge van het gebruik of de onmogelijkheid van het gebruik van dit beveiligingsadvies, waaronder begrepen schade ten gevolge van de onjuistheid of onvolledigheid van de informatie in dit beveiligingsadvies. Op dit beveiligingsadvies is Nederlands recht van toepassing. Alle geschillen in verband met en/of voortvloeiend uit dit beveiligingsadvies zullen worden voorgelegd aan de exclusief bevoegde rechter te Den Haag. Deze rechtskeuze geldt tevens voor de voorzieningenrechter in kort geding. -----BEGIN PGP SIGNATURE----- wsDzBAEBCgAdBQJnkPMmFiEEj9lz1UkzuNhtLOX5ytTOqyR+cF8ACgkQytTOqyR+ cF9FBQwAwAD8NHFquE7xZedovnVnvNw/HqigkvMe6pyJGZek2IIFa0+drVf33C5+ 3n7Vc8HgicKQUevZFXYop07gV1IoaXmZUZSr73wA976B+AYeTstYRzCZbBawJ36P KnMO0fm7tZLrBdTDTP0rui4BTtu+jvKh4xGlUo5NBHJPRUMpbDg7yegi6cuSyA3u U+ucHi/5vsp1arAfYEUMzZbPmQ5KHdaV+/2SGRf+q8FUa6kPOqHX4pdKfCYkeVDV r+2YPTBhT29zsoI3KVwjM+Q6lCaAFEw+RFzEGeIiPZLS158yi3lSXn6eGxct5r3L FiLsFvu+JwauPZ7qM3phRQ+F4e70Tp3hqF9Fi114SwygRgTj2xJVWwHIe/xNa7Dm rnnLxtTGUDCE11GjCeCkHxnliI8FW3s2CIHOT5ClgPnoJzlbhrIyOKPfqJYMclP8 IqeGj0mR8JTOC5B0lHGSTjUP++3PQYG9p5lb+jup1k/rq+SlDCltoUAXpn4aUVdd S39lndsp =7PMm -----END PGP SIGNATURE-----