Oracle Critical Patch Update Advisory – July 2022

Oracle Critical Patch Update Advisory – July 2022

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 349 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at July 2022 Critical Patch Update: Executive Summary and Analysis.

Please note that since the release of the April 2022 Critical Patch Update, Oracle has released a Security Alert for Oracle E-Business Suite CVE-2022-21500 (May 19, 2022). Customers are strongly advised to apply the July 2022 Critical Patch Update for Oracle E-Business Suite, which includes patches for this Alert as well as additional patches.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Autonomous Health Framework Oracle Autonomous Health Framework
Big Data Spatial and Graph, versions prior to 23.1 Database
Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 Enterprise Manager
Enterprise Manager for MySQL Database Enterprise Manager
Enterprise Manager Ops Center, version 12.4.0.0 Enterprise Manager
JD Edwards EnterpriseOne Orchestrator, versions 9.2.6.3 and prior JD Edwards
JD Edwards EnterpriseOne Tools, versions 9.2.6.3 and prior JD Edwards
MySQL Cluster, versions 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior, 8.0.29 and prior, and8.0.29 and prior MySQL
MySQL Enterprise Monitor, versions 8.0.30 and prior MySQL
MySQL Server, versions 5.7.38 and prior, 8.0.29 and prior MySQL
MySQL Shell, versions 8.0.28 and prior MySQL
MySQL Shell for VS Code, versions 1.1.8 and prior MySQL
MySQL Workbench, versions 8.0.29 and prior MySQL
Oracle Agile Engineering Data Management, version 6.2.1.0 Oracle Supply Chain Products
Oracle Agile PLM, version 9.3.6 Oracle Supply Chain Products
Oracle Agile Product Lifecycle Management for Process, versions 6.2.2, 6.2.3 Oracle Supply Chain Products
Oracle Application Express, versions prior to 22.1.1 Database
Oracle Application Testing Suite, version 13.3.0.1 Enterprise Manager
Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2 Oracle Supply Chain Products
Oracle Banking Branch, version 14.5 Contact Support
Oracle Banking Cash Management, version 14.5 Contact Support
Oracle Banking Corporate Lending Process Management, version 14.5 Contact Support
Oracle Banking Credit Facilities Process Management, version 14.5 Contact Support
Oracle Banking Deposits and Lines of Credit Servicing, version 2.7 Contact Support
Oracle Banking Electronic Data Exchange for Corporates, version 14.5 Contact Support
Oracle Banking Liquidity Management, versions 14.2, 14.5 Contact Support
Oracle Banking Origination, version 14.5 Contact Support
Oracle Banking Party Management, version 2.7 Oracle Banking Platform
Oracle Banking Platform, versions 2.6.2, 2.9, 2.12 Oracle Banking Platform
Oracle Banking Supply Chain Finance, version 14.5 Contact Support
Oracle Banking Trade Finance, version 14.5 Contact Support
Oracle Banking Trade Finance Process Management, version 14.5 Contact Support
Oracle Banking Virtual Account Management, version 14.5 Contact Support
Oracle Berkeley DB Berkeley DB
Oracle BI Publisher, versions 12.2.1.3.0, 12.2.1.4.0 Oracle Analytics
Oracle Blockchain Platform Oracle Blockchain Platform
Oracle Business Intelligence Enterprise Edition, version 5.9.0.0.0 Oracle Analytics
Oracle Coherence, versions 3.7.1.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle Commerce Guided Search, version 11.3.2 Oracle Commerce
Oracle Commerce Merchandising, version 11.3.2 Oracle Commerce
Oracle Commerce Platform, versions 11.3.0, 11.3.1, 11.3.2 Oracle Commerce
Oracle Communications ASAP, version 7.3 Oracle Communications ASAP
Oracle Communications Billing and Revenue Management, versions 12.0.0.4.0-12.0.0.6.0 Oracle Communications Billing and Revenue Management
Oracle Communications BRM – Elastic Charging Engine, versions prior to 12.0.0.4.6, prior to 12.0.0.5.1 Oracle Communications BRM – Elastic Charging Engine
Oracle Communications Cloud Native Core Binding Support Function, versions 22.1.3, 22.2.0 Oracle Communications Cloud Native Core Binding Support Function
Oracle Communications Cloud Native Core Console, versions 22.1.2, 22.2.0 Oracle Communications Cloud Native Core Console
Oracle Communications Cloud Native Core Network Exposure Function, version 22.1.1 Oracle Communications Cloud Native Core Network Exposure Function
Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 22.1.0, 22.1.2, 22.2.0 Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Oracle Communications Cloud Native Core Network Repository Function, versions 22.1.2, 22.2.0 Oracle Communications Cloud Native Core Network Repository Function
Oracle Communications Cloud Native Core Network Slice Selection Function, version 22.1.1 Oracle Communications Cloud Native Core Network Slice Selection Function
Oracle Communications Cloud Native Core Policy, versions 22.1.3, 22.2.0 Oracle Communications Cloud Native Core Policy
Oracle Communications Cloud Native Core Security Edge Protection Proxy, version 22.1.1 Oracle Communications Cloud Native Core Security Edge Protection Proxy
Oracle Communications Cloud Native Core Service Communication Proxy, version 22.2.0 Oracle Communications Cloud Native Core Service Communication Proxy
Oracle Communications Cloud Native Core Unified Data Repository, version 22.2.0 Oracle Communications Cloud Native Core Unified Data Repository
Oracle Communications Core Session Manager, versions 8.2.5, 8.4.5 Oracle Communications Core Session Manager
Oracle Communications Design Studio, version 7.4.2 Oracle Communications Design Studio
Oracle Communications Instant Messaging Server, version 10.0.1.5.0 Oracle Communications Instant Messaging Server
Oracle Communications IP Service Activator Oracle Communications IP Service Activator
Oracle Communications Offline Mediation Controller, versions prior to 12.0.0.4.4, prior to 12.0.0.5.1 Oracle Communications Offline Mediation Controller
Oracle Communications Operations Monitor, versions 4.3, 4.4, 5.0 Oracle Communications Operations Monitor
Oracle Communications Session Border Controller, versions 8.4, 9.0, 9.1 Oracle Communications Session Border Controller
Oracle Communications Unified Inventory Management, versions 7.4.1, 7.4.2, 7.5.0 Oracle Communications Unified Inventory Management
Oracle Communications Unified Session Manager, version 8.2.5 Oracle Communications Unified Session Manager
Oracle Crystal Ball, versions 11.1.2.0.0-11.1.2.4.900 Oracle Construction and Engineering Suite
Oracle Data Integrator Fusion Middleware
Oracle Database Server, versions 12.1.0.2, 19c, 21c Database
Oracle E-Business Suite, versions 12.2.3-12.2.11 Oracle E-Business Suite
Oracle Enterprise Communications Broker, version 3.3 Oracle Enterprise Communications Broker
Oracle Enterprise Operations Monitor, versions 4.3, 4.4, 5.0 Oracle Enterprise Operations Monitor
Oracle Enterprise Session Border Controller, versions 8.4, 9.0, 9.1 Oracle Enterprise Session Border Controller
Oracle Essbase, version 21.3 Database
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1 Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Behavior Detection Platform, versions 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1 Oracle Financial Services Behavior Detection Platform
Oracle Financial Services Crime and Compliance Management Studio, versions 8.0.8.2.0, 8.0.8.3.0 Oracle Financial Services Crime and Compliance Management Studio
Oracle Financial Services Enterprise Case Management, versions 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1 Oracle Financial Services Enterprise Case Management
Oracle Financial Services Revenue Management and Billing, versions 2.9.0.0.0, 2.9.0.1.0, 3.0.0.0.0-3.2.0.0.0, 4.0.0.0.0 Oracle Financial Services Revenue Management and Billing
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition, versions 8.0.7.0, 8.0.8.0 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition
Oracle FLEXCUBE Core Banking, versions 5.2, 11.6-11.8, 11.10 Contact Support
Oracle FLEXCUBE Private Banking, version 12.1 Contact Support
Oracle FLEXCUBE Universal Banking, versions 12.1-12.4, 14.0-14.3, 14.5 Contact Support
Oracle Global Lifecycle Management NextGen OUI Framework, versions prior to 13.9.4.2.10 Fusion Middleware
Oracle Global Lifecycle Management OPatch, versions prior to 12.2.0.1.30 Global Lifecycle Management
Oracle GoldenGate, versions [19c] prior to 19.1.0.0.220719, [21c] prior to 21.7.0.0.0 Database
Oracle GraalVM Enterprise Edition, versions 20.3.6, 21.3.2, 22.1.0 Java SE
Oracle Graph Server and Client, versions prior to 22.2.0 Database
Oracle Health Sciences Data Management Workbench, versions 2.4.8.7, 2.5.2.1, 3.0.0.0, 3.1.0.3 Health Sciences
Oracle Health Sciences Empirica Signal, versions 9.1.0.52, 9.2.0.52 Health Sciences
Oracle Health Sciences Information Manager, versions 3.0.0.1, 3.0.1.0-3.0.5.0 HealthCare Applications
Oracle Healthcare Foundation, versions 8.1.0, 8.2.0, 8.2.1 HealthCare Applications
Oracle Hospitality Cruise Shipboard Property Management System, version 20.2.1 Oracle Hospitality Cruise Shipboard Property Management System
Oracle Hospitality Inventory Management, version 9.1 Oracle Hospitality Inventory Management
Oracle Hospitality Materials Control, version 18.1 Oracle Hospitality Materials Control
Oracle Hospitality OPERA 5, version 5.6 Oracle Hospitality OPERA 5 Property Services
Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Identity Management Suite Fusion Middleware
Oracle Identity Manager Connector Fusion Middleware
Oracle Java SE, versions 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1 Java SE
Oracle Managed File Transfer, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Middleware Common Libraries and Tools, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle NoSQL Database NoSQL Database
Oracle Policy Automation, versions 12.2.0-12.2.25 Oracle Policy Automation
Oracle Policy Automation for Mobile Devices, versions 12.2.0-12.2.24 Oracle Policy Automation
Oracle Product Lifecycle Analytics, version 3.6.1 Oracle Supply Chain Products
Oracle REST Data Services, versions prior to 22.1.1 Database
Oracle Retail Allocation, versions 15.0.3.1, 16.0.3 Retail Applications
Oracle Retail Bulk Data Integration, version 16.0.3 Retail Applications
Oracle Retail Customer Insights, versions 15.0.2, 16.0.2 Retail Applications
Oracle Retail Customer Management and Segmentation Foundation, versions 17.0, 18.0, 19.0 Retail Applications
Oracle Retail Extract Transform and Load, version 13.2.5 Retail Applications
Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Integration Bus, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Merchandising System, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Order Broker, versions 18.0, 19.1 Retail Applications
Oracle Retail Pricing, version 19.0.1 Retail Applications
Oracle Retail Sales Audit, versions 15.0.3.1, 16.0.3 Retail Applications
Oracle Retail Xstore Point of Service, versions 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.1 Retail Applications
Oracle SD-WAN Edge, versions 9.0, 9.1 Oracle SD-WAN Edge
Oracle Security Service, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle SOA Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Solaris, versions 10, 11 Systems
Oracle Spatial Studio, versions prior to 22.1.0 Database
Oracle SQL Developer Database
Oracle Stream Analytics, versions [19c] prior to 19.1.0.0.6.4 Database
Oracle TimesTen In-Memory Database, versions prior to 22.1.1.1.0 Database
Oracle Transportation Management, version 1.4.4 Oracle Supply Chain Products
Oracle Utilities Framework, versions 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.5.0.0.0 Oracle Utilities Applications
Oracle VM VirtualBox, versions prior to 6.1.36 Virtualization
Oracle WebCenter Content, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebCenter Sites Support Tools, versions 4.4.2 and prior Fusion Middleware
Oracle WebLogic Server, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle ZFS Storage Appliance Kit, version 8.8 Systems
PeopleSoft Enterprise PeopleTools, versions 8.58, 8.59 PeopleSoft
Primavera Gateway, versions 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8, 21.12.0-21.12.1 Oracle Construction and Engineering Suite
Primavera P6 Enterprise Project Portfolio Management, versions 17.12.0.0-17.12.20.4, 18.8.0.0-18.8.25.4, 19.12.0.0-19.12.19.0, 20.12.0.0-20.12.14.0, 21.12.0.0-21.12.4.0 Oracle Construction and Engineering Suite
Primavera Unifier, versions 17.7-17.12, 18.8, 19.12, 20.12, 21.12 Oracle Construction and Engineering Suite
Siebel Applications, versions 22.6 and prior Siebel

Note:

  • Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
  • Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris 10 customers should refer to the latest patch-sets which contain critical security patches detailed in Systems Patch Availability Document. Please see Reference Index of CVE IDs and Solaris Patches (My Oracle Support Note 1448883.1) for more information.
  • Users running Java SE with a browser can download the latest release from https://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product’s risk matrix.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • 4ra1n: CVE-2022-21557, CVE-2022-21560, CVE-2022-21562, CVE-2022-21564
  • Ahmed Alwardani: CVE-2022-21568
  • Ahmed Shah of Red Canari: CVE-2022-21543
  • Alexander Kornbrust of Red Database Security: CVE-2022-21510
  • Anonymous researcher working with Trend Micro’s Zero Day Initiative: CVE-2022-21550
  • Eddie Zhu of Beijing DBSEC Technology Co., Ltd: CVE-2022-21511
  • Emad Al-Mousa: CVE-2022-21432
  • Felix Wilhelm of Google: CVE-2022-34169
  • Hugo Santiago dos Santos: CVE-2022-21575
  • korean_buljumuk: CVE-2022-21571
  • Kun Yang of Chaitin Security Research Lab: CVE-2022-21554
  • Liboheng of Tophant Starlight laboratory: CVE-2022-21548
  • Lidor Ben Shitrit from Orca Security: CVE-2022-21551
  • Lu Yu of Chaitin Security Research Lab: CVE-2022-21554
  • M Talha Shafique: CVE-2022-21545
  • Matthias Kaiser of Apple Information Security: CVE-2022-21516, CVE-2022-21536
  • Nadeem Douba of Red Canari: CVE-2022-21543
  • Orwa Atyat: CVE-2022-21567
  • r00t4dm: CVE-2022-21523
  • Ronnie Salomonsen of Mandiant Services: CVE-2022-21558
  • Sanehdeep Singh: CVE-2022-21544
  • thiscodecc of MoyunSec V-Lab: CVE-2022-21570
  • Turki Al-harthi: CVE-2022-21567
  • y4tacker: CVE-2022-21557
  • Zacharias Pigadas of Foregenix: CVE-2022-21552
  • Zu-Ming Jiang: CVE-2022-21556
  • 潘宏弢: CVE-2022-21549

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program:

  • Cheng Xu
  • Emad Al-Mousa
  • John Jackson
  • Kelly Kaoudis
  • Nick Sahler
  • Rizal Muhammed
  • Sick Codes
  • Stuart Monteith of Arm
  • Victor Viale

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.

For this quarter, Oracle recognizes the following for contributions to Oracle’s On-Line Presence Security program:

  • Ahmed Hassan
  • Ekin Şiar Bayer
  • Elad Gabay of Wiz.io
  • Gabriel
  • Hamoud Al-Helmani
  • Hannu Forsten [3 reports]
  • Heitor Gouvêa
  • ilyas ORAK
  • k0xx
  • Lawrence See Yon Hoe
  • Nikesh Gogia
  • Paul Wise
  • Semih Comak
  • Shuvam Adhikari [2 reports]
  • Siddhesh Parab
  • tayyab sial
  • wardi abdi
  • Yassine Triki
  • Zach Edwards of victorymedium.com

Critical Patch Update Schedule

Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 18 October 2022
  • 17 January 2023
  • 18 April 2023
  • 18 July 2023

References

Modification History

Date Note
2022-July-28 Rev 3. Updated the affected versions WebLogic CVE-2021-40690
2022-July-25 Rev 2. Updated the version details for WebCenter Sites Support Tools and Credit added for CVE-2022-21551
2022-July-19 Rev 1. Initial Release.

Oracle Database Products Risk Matrices

This Critical Patch Update contains 23 new security patches for Oracle Database Products divided as follows:

  • 9 new security patches for Oracle Database Products
  • No new security patches for Oracle Autonomous Health Framework, but third party patches are provided
  • No new security patches for Oracle Berkeley DB, but third party patches are provided
  • 3 new security patches for Oracle Big Data Graph
  • No new security patches for Oracle Blockchain Platform, but third party patches are provided
  • 1 new security patch for Oracle Essbase
  • 1 new security patch for Oracle Global Lifecycle Management
  • 4 new security patches for Oracle GoldenGate
  • 1 new security patch for Oracle Graph Server and Client
  • No new security patches for Oracle NoSQL Database, but third party patches are provided
  • 2 new security patches for Oracle REST Data Services
  • 1 new security patch for Oracle Spatial Studio
  • No new security patches for Oracle SQL Developer, but third party patches are provided
  • 1 new security patch for Oracle TimesTen In-Memory Database

Oracle Database Server Risk Matrix

This Critical Patch Update contains 9 new security patches plus additional third party patches noted below for Oracle Database Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-35169 Oracle Database – Enterprise Edition None TCPS Yes 9.1 Network Low None None Un-

changed
High High None 12.1.0.2, 19c, 21c
CVE-2022-21510 Oracle Database – Enterprise Edition Sharding Local Logon None No 8.8 Local Low Low None Changed High High High None See Note 1
CVE-2022-21511 Oracle Database – Enterprise Edition Recovery EXECUTE ON DBMS_IR.EXECUTESQLSCRIPT Oracle Net No 7.2 Network Low High None Un-

changed
High High High None See Note 1
CVE-2022-21565 Java VM Create Procedure Oracle Net No 6.5 Network Low Low None Un-

changed
None High None 12.1.0.2, 19c, 21c
CVE-2022-24729 Oracle Application Express (CKEditor) User Account HTTP No 5.7 Network Low Low Required Un-

changed
None None High Prior to 22.1.1
CVE-2021-41184 Oracle Application Express (jQueryUI) User Account HTTP No 5.4 Network Low Low Required Changed Low Low None Prior to 22.1.1
CVE-2022-0839 Oracle SQLcl (Liquibase) Local Logon None No 5.0 Local Low Low Required Un-

changed
High None None 19c
CVE-2021-45943 Oracle Spatial and Graph (GDAL) Create Session Oracle Net No 4.3 Network Low Low None Un-

changed
None None Low 19c, 21c
CVE-2022-21432 Oracle Database – Enterprise Edition RDBMS Security DBA role Oracle Net No 2.7 Network Low High None Un-

changed
None None Low 12.1.0.2, 19c, 21c

Notes:

  1. None of the supported versions are affected.

Additional CVEs addressed are:

  • The patch for CVE-2020-35169 also addresses CVE-2020-26185, CVE-2020-29505, CVE-2020-29506, CVE-2020-29507, CVE-2020-29508, CVE-2020-35163, CVE-2020-35164, CVE-2020-35166, CVE-2020-35167, and CVE-2020-35168.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Database Enterprise Edition (Apache Tomcat): CVE-2022-29885.
  • Oracle Universal Installer (jackson-databind): CVE-2020-36518.

Oracle Database Server Client-Only Installations

  • The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2020-35169.

Oracle Autonomous Health Framework Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Autonomous Health Framework. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Autonomous Health Framework. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Autonomous Health Framework
    • Autonomous Health Framework (NumPy): CVE-2021-41496 and CVE-2021-41495.
    • Autonomous Health Framework (Python): CVE-2021-29921 and CVE-2020-29396.
    • Trace File Analyzer (jackson-databind): CVE-2020-36518.

Oracle Berkeley DB Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Berkeley DB. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Berkeley DB. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Berkeley DB Data Store
    • Data Store (Apache Log4j): CVE-2022-23305, CVE-2021-4104, CVE-2022-23302 and CVE-2022-23307.

Oracle Big Data Graph Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Big Data Graph. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-42340 Big Data Spatial and Graph Big Data Graph (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 23.1
CVE-2020-36518 Big Data Spatial and Graph Big Data Graph (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 23.1
CVE-2021-41184 Big Data Spatial and Graph Big Data Graph (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 23.1

Additional CVEs addressed are:

  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.

Oracle Blockchain Platform Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Blockchain Platform. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Blockchain Platform. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Blockchain Platform
    • Blockchain Cloud Service Console (OpenSSH): CVE-2021-41617.

Oracle Essbase Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Essbase. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21508 Oracle Essbase Security and Provisioning None No 5.8 Local Low High Required Un-

changed
High High None 21.3

Oracle Global Lifecycle Management Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Global Lifecycle Management. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23437 Oracle Global Lifecycle Management OPatch Patch Installer (Apache Xerces-J) Local Logon No 4.2 Local Low High Required Un-

changed
None None High Prior to 12.2.0.1.30

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Global Lifecycle Management OPatch
    • Patch Installer (jackson-databind): CVE-2020-36518.

Oracle GoldenGate Risk Matrix

This Critical Patch Update contains 4 new security patches plus additional third party patches noted below for Oracle GoldenGate. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3749 Oracle GoldenGate Oracle GoldenGate (axios) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 21c: prior to 21.7.0.0.0
CVE-2022-21551 Oracle GoldenGate Oracle GoldenGate HTTP No 6.8 Network Low High Required Un-

changed
High High High 21c: prior to 21.7.0.0.0; 19c: prior to 19.1.0.0.220719
CVE-2021-34429 Oracle Stream Analytics Oracle Stream Analytics (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 19c: prior to 19.1.0.0.6.4
CVE-2021-37714 Oracle Stream Analytics Oracle Stream Analytics (jsoup) HTTP No 4.9 Network Low High None Un-

changed
None None High 19c: prior to 19.1.0.0.6.4

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle GoldenGate
    • General (Apache Log4j): CVE-2022-23307, CVE-2019-17571, CVE-2021-4104, CVE-2022-23302 and CVE-2022-23305.
    • Oracle GoldenGate (zlib): CVE-2018-25032.
  • Oracle Stream Analytics
    • Install (Apache Log4j): CVE-2022-23305, CVE-2019-17571, CVE-2021-4104, CVE-2022-23302 and CVE-2022-23307.

Oracle Graph Server and Client Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Graph Server and Client. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-36518 Oracle Graph Server and Client Oracle Graph Server (jackson-databind) HTTP No 6.5 Network Low Low None Un-

changed
None None High Prior to 22.2.0

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Graph Server and Client
    • Install (Apache Tomcat): CVE-2022-23181 and CVE-2020-9484.

Oracle NoSQL Database Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle NoSQL Database
    • Administration (Netty): CVE-2021-43797.

Oracle REST Data Services Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle REST Data Services. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-41184 Oracle REST Data Services Oracle REST Data Services (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 22.1.1
CVE-2021-34429 Oracle REST Data Services Oracle REST Data Services (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None Prior to 22.1.1

Additional CVEs addressed are:

  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.

Oracle Spatial Studio Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Spatial Studio. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-36518 Oracle Spatial Studio Oracle Spatial Studio (jackson-databind) HTTP No 6.5 Network Low Low None Un-

changed
None None High Prior to 22.1.0

Oracle SQL Developer Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle SQL Developer. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle SQL Developer
    • Oracle SQL Developer (Apache PDFBox): CVE-2021-31812 and CVE-2021-31811.

Oracle TimesTen In-Memory Database Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle TimesTen In-Memory Database. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle TimesTen In-Memory Database Oracle TimesTen In-Memory Database Cache Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 22.1.1.1.0

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle TimesTen In-Memory Database
    • Kubernetes Operator (Go): CVE-2022-23806, CVE-2021-41771, CVE-2021-41772, CVE-2022-23772 and CVE-2022-23773.
    • TimesTen Grid (Apache Log4j): CVE-2022-23305, CVE-2021-4104, CVE-2022-23302 and CVE-2022-23307.

Oracle Commerce Risk Matrix

This Critical Patch Update contains 12 new security patches for Oracle Commerce. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-10683 Oracle Commerce Guided Search Content Acquisition System (dom4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.3.2
CVE-2019-17495 Oracle Commerce Guided Search Framework, Experience Manager (Swagger UI) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.3.2
CVE-2022-22965 Oracle Commerce Platform Endeca Integration (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.3.2
CVE-2020-28052 Oracle Commerce Guided Search Framework, Experience Manager (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 11.3.2
CVE-2021-40690 Oracle Commerce Guided Search Content Acquisition System (Apache CXF) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.3.2
CVE-2021-22946 Oracle Commerce Guided Search Framework, Experience Manager (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.3.2
CVE-2022-24729 Oracle Commerce Merchandising Core (CKEditor) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.3.2
CVE-2020-36518 Oracle Commerce Platform Dynamo Application Framework (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.3.0, 11.3.1, 11.3.2
CVE-2021-40690 Oracle Commerce Platform Endeca Integration (Apache CXF) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.3.2
CVE-2021-3450 Oracle Commerce Guided Search Framework, Experience Manager (OpenSSL) TLS Yes 7.4 Network High None None Un-

changed
High High None 11.3.2
CVE-2020-7712 Oracle Commerce Guided Search Framework, Experience Manager (Apache ZooKeeper) HTTP No 7.2 Network Low High None Un-

changed
High High High 11.3.2
CVE-2022-21559 Oracle Commerce Platform Dynamo Application Framework None No 5.5 Local Low Low None Un-

changed
High None None 11.3.0, 11.3.1, 11.3.2

Additional CVEs addressed are:

  • The patch for CVE-2021-22946 also addresses CVE-2021-22947.
  • The patch for CVE-2021-3450 also addresses CVE-2021-3449.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.

Oracle Communications Applications Risk Matrix

This Critical Patch Update contains 17 new security patches plus additional third party patches noted below for Oracle Communications Applications. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle Communications Instant Messaging Server XMPP Server (Apache Log4j) XMPP Yes 9.8 Network Low None None Un-

changed
High High High 10.0.1.5.0
CVE-2022-23305 Oracle Communications Offline Mediation Controller Charging Server (Apache Log4j) LDAP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 12.0.0.4.4, Prior to 12.0.0.5.1
CVE-2022-23632 Oracle Communications Unified Inventory Management Cloud Native (Traefik) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.5.0
CVE-2022-22965 Oracle Communications Unified Inventory Management TMF APIs (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.4.1, 7.4.2, 7.5.0
CVE-2022-21429 Oracle Communications Billing and Revenue Management Billing Care HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.0.0.4.0-12.0.0.6.0
CVE-2020-36518 Oracle Communications Billing and Revenue Management Billing Care, BOC, DM Kafka, REST API (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.0.0.4.0-12.0.0.6.0
CVE-2021-37137 Oracle Communications BRM – Elastic Charging Engine 5G gateway (Google Snappy) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 12.0.0.4.6, Prior to 12.0.0.5.1
CVE-2021-43859 Oracle Communications BRM – Elastic Charging Engine EM Gateway (XStream) TCP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 12.0.0.4.6, Prior to 12.0.0.5.1
CVE-2021-44832 Oracle Communications BRM – Elastic Charging Engine Charging Server (Apache Log4j) TCP No 6.6 Network High High None Un-

changed
High High High Prior to 12.0.0.4.6, Prior to 12.0.0.5.1
CVE-2021-44832 Oracle Communications Offline Mediation Controller Admin Server and Node Manager (Apache Log4j) LDAP No 6.6 Network High High None Un-

changed
High High High Prior to 12.0.0.4.4, Prior to 12.0.0.5.1
CVE-2022-23437 Oracle Communications ASAP SRT (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 7.3
CVE-2022-21573 Oracle Communications Billing and Revenue Management Billing Care HTTP No 6.5 Network Low Low None Un-

changed
None None High 12.0.0.4.0-12.0.0.6.0
CVE-2021-43797 Oracle Communications Design Studio PSR Designer (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 7.4.2
CVE-2022-22969 Oracle Communications Design Studio Patch Request (Spring Security OAuth) HTTP No 6.5 Network Low Low None Un-

changed
None None High 7.4.2
CVE-2021-38153 Oracle Communications BRM – Elastic Charging Engine Notifications (Apache Kafka) TCP Yes 5.9 Network High None None Un-

changed
High None None Prior to 12.0.0.4.6, Prior to 12.0.0.5.1
CVE-2022-21572 Oracle Communications Billing and Revenue Management Billing Care HTTP No 5.4 Network Low Low Required Changed Low Low None 12.0.0.4.0-12.0.0.6.0
CVE-2022-21574 Oracle Communications Billing and Revenue Management Connection Manager HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 12.0.0.4.0-12.0.0.6.0

Additional CVEs addressed are:

  • The patch for CVE-2021-37137 also addresses CVE-2021-37136.
  • The patch for CVE-2021-38153 also addresses CVE-2021-26291.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications BRM – Elastic Charging Engine
    • Charging Server (Spring Framework): CVE-2022-22965.
  • Oracle Communications IP Service Activator
    • Network Processor (Apache Xerces-J): CVE-2022-23437.

Oracle Communications Risk Matrix

This Critical Patch Update contains 56 new security patches plus additional third party patches noted below for Oracle Communications. 45 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22947 Oracle Communications Cloud Native Core Binding Support Function BSF (Spring Cloud Gateway) HTTP Yes 10.0 Network Low None None Changed High High High 22.1.3
CVE-2022-22947 Oracle Communications Cloud Native Core Console CNC Console (Spring Cloud Gateway) HTTP Yes 10.0 Network Low None None Changed High High High 22.2.0
CVE-2022-22947 Oracle Communications Cloud Native Core Network Repository Function NRF (Spring Cloud Gateway) HTTP Yes 10.0 Network Low None None Changed High High High 22.1.2, 22.2.0
CVE-2022-22947 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Spring Cloud Gateway) HTTP Yes 10.0 Network Low None None Changed High High High 22.1.1
CVE-2022-22965 Oracle Communications Cloud Native Core Binding Support Function BSF (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.3
CVE-2022-23219 Oracle Communications Cloud Native Core Binding Support Function BSF (glibc) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.3
CVE-2022-1154 Oracle Communications Cloud Native Core Network Exposure Function NEF (vim) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.1
CVE-2020-14343 Oracle Communications Cloud Native Core Network Function Cloud Native Environment CNE (PyYAML) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.0
CVE-2021-3177 Oracle Communications Cloud Native Core Network Function Cloud Native Environment CNE (Python) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.2.0
CVE-2022-23219 Oracle Communications Cloud Native Core Network Function Cloud Native Environment CNE (glibc) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.0
CVE-2022-22963 Oracle Communications Cloud Native Core Network Function Cloud Native Environment DBTier (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.2
CVE-2022-23219 Oracle Communications Cloud Native Core Network Repository Function NRF (glibc) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.2, 22.2.0
CVE-2022-22963 Oracle Communications Cloud Native Core Policy Policy (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.3
CVE-2022-23219 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (glibc) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.1
CVE-2022-25845 Oracle Communications Cloud Native Core Unified Data Repository UDR (fastjson) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.2.0
CVE-2022-23219 Oracle Communications Cloud Native Core Unified Data Repository UDR (glibc) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.2.0
CVE-2022-23219 Oracle Enterprise Operations Monitor Mediation Engine (glibc) TCP/IP Yes 9.8 Network Low None None Un-

changed
High High High 4.3, 4.4, 5.0
CVE-2022-24407 Oracle Communications Cloud Native Core Console CNC Console (Cyrus SASL) HTTP No 8.8 Network Low Low None Un-

changed
High High High 22.2.0
CVE-2022-24407 Oracle Communications Cloud Native Core Network Function Cloud Native Environment CNE (Cyrus SASL) HTTP No 8.8 Network Low Low None Un-

changed
High High High 22.2.0
CVE-2022-24407 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Cyrus SASL) HTTP No 8.8 Network Low Low None Un-

changed
High High High 22.1.1
CVE-2022-25636 Oracle Communications Cloud Native Core Binding Support Function Oracle Linux None No 7.8 Local Low Low None Un-

changed
High High High 22.1.3
CVE-2022-25636 Oracle Communications Cloud Native Core Network Exposure Function Oracle Linux None No 7.8 Local Low Low None Un-

changed
High High High 22.1.1
CVE-2022-25636 Oracle Communications Cloud Native Core Policy Oracle Linux None No 7.8 Local Low Low None Un-

changed
High High High 22.2.0
CVE-2022-24735 Oracle Communications Operations Monitor Fraud Detection Monitor (Redis) None No 7.8 Local Low None Required Un-

changed
High High High 4.3, 4.4, 5.0
CVE-2020-36518 Oracle Communications Cloud Native Core Binding Support Function BSF (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.3
CVE-2022-23308 Oracle Communications Cloud Native Core Binding Support Function BSF (libxml2) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.2.0
CVE-2018-25032 Oracle Communications Cloud Native Core Console CNC Console (zlib) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.2
CVE-2018-25032 Oracle Communications Cloud Native Core Network Exposure Function NEF (zlib) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.1
CVE-2019-20916 Oracle Communications Cloud Native Core Network Function Cloud Native Environment CNE (Package Installer for Python) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 22.1.0
CVE-2022-23308 Oracle Communications Cloud Native Core Network Function Cloud Native Environment CNE (libxml2) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.0
CVE-2021-22119 Oracle Communications Cloud Native Core Network Repository Function NRF (Spring Security) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.2, 22.2.0
CVE-2020-36518 Oracle Communications Cloud Native Core Network Repository Function NRF (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.2, 22.2.0
CVE-2022-23308 Oracle Communications Cloud Native Core Network Repository Function NRF (libxml2) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.2, 22.2.0
CVE-2020-36518 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.1
CVE-2022-23308 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (libxml2) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.1
CVE-2020-36518 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.1
CVE-2018-25032 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (zlib) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.1.1
CVE-2022-0778 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 22.1.1
CVE-2020-36518 Oracle Communications Cloud Native Core Service Communication Proxy SCP (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.2.0
CVE-2020-36518 Oracle Communications Cloud Native Core Unified Data Repository UDR (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.2.0
CVE-2022-23308 Oracle Communications Cloud Native Core Unified Data Repository UDR (libxml2) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.2.0
CVE-2018-25032 Oracle Communications Cloud Native Core Unified Data Repository UDR (zlib) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 22.2.0
CVE-2022-0778 Oracle Communications Cloud Native Core Unified Data Repository UDR (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 22.2.0
CVE-2022-0778 Oracle Communications Core Session Manager Security (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 8.2.5, 8.4.5
CVE-2022-0778 Oracle Communications Operations Monitor Mediation Engine (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 4.3, 4.4, 5.0
CVE-2022-0778 Oracle Communications Session Border Controller Security (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 8.4, 9.0, 9.1
CVE-2022-0778 Oracle Communications Unified Session Manager Security (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 8.2.5
CVE-2022-0778 Oracle Enterprise Communications Broker Security (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 3.3
CVE-2022-0778 Oracle Enterprise Session Border Controller Security (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High 8.4, 9.0, 9.1
CVE-2020-36518 Oracle SD-WAN Edge MGMT (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 9.0, 9.1
CVE-2022-1271 Oracle Communications Cloud Native Core Console CNC Console (GNU Gzip) HTTP No 7.1 Network High Low Required Un-

changed
High High High 22.1.2
CVE-2022-1271 Oracle Communications Cloud Native Core Unified Data Repository UDR (GNU Gzip) HTTP No 7.1 Network High Low Required Un-

changed
High High High 22.2.0
CVE-2021-37750 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (MIT Kerberos) HTTP No 6.5 Network Low Low None Un-

changed
None None High 22.1.1
CVE-2021-3572 Oracle Communications Cloud Native Core Policy Policy (Package Installer for Python) HTTP No 5.7 Network Low Low Required Un-

changed
None High None 22.1.3
CVE-2022-24329 Oracle Communications Cloud Native Core Binding Support Function BSF (JetBrains Kotlin) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 22.1.3
CVE-2021-34141 Oracle Communications Cloud Native Core Policy Policy (NumPy) HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 22.1.3

Additional CVEs addressed are:

  • The patch for CVE-2019-20916 also addresses CVE-2021-3572.
  • The patch for CVE-2020-14343 also addresses CVE-2020-1747.
  • The patch for CVE-2021-3177 also addresses CVE-2018-18074, CVE-2019-20916, CVE-2019-9636, CVE-2019-9740, CVE-2020-26137, and CVE-2020-27619.
  • The patch for CVE-2022-22947 also addresses CVE-2022-22946, and CVE-2022-22965.
  • The patch for CVE-2022-22963 also addresses CVE-2022-22965.
  • The patch for CVE-2022-23219 also addresses CVE-2021-38604, CVE-2021-43396, and CVE-2022-23218.
  • The patch for CVE-2022-24735 also addresses CVE-2022-24736.
  • The patch for CVE-2022-25636 also addresses CVE-2018-25032, CVE-2020-0404, CVE-2020-13974, CVE-2020-27820, CVE-2020-4788, CVE-2021-20322, CVE-2021-21781, CVE-2021-29154, CVE-2021-3612, CVE-2021-3672, CVE-2021-37159, CVE-2021-3737, CVE-2021-3743, CVE-2021-3744, CVE-2021-3752, CVE-2021-3772, CVE-2021-3773, CVE-2021-4002, CVE-2021-4083, CVE-2021-4157, CVE-2021-4197, CVE-2021-4203, CVE-2021-42739, CVE-2021-43389, CVE-2021-43818, CVE-2021-43976, CVE-2021-45485, CVE-2021-45486, CVE-2022-0001, CVE-2022-0002, CVE-2022-0286, CVE-2022-0322, and CVE-2022-1011.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications Cloud Native Core Network Slice Selection Function
    • NSSF (glibc): CVE-2022-23219, CVE-2021-38604, CVE-2021-43396 and CVE-2022-23218.
  • Oracle Communications Cloud Native Core Security Edge Protection Proxy
    • SEPP (Spring Framework): CVE-2022-22968 and CVE-2022-22965.
  • Oracle Communications Cloud Native Core Service Communication Proxy
    • SCP (Spring Boot): CVE-2022-22968 and CVE-2022-22965.
  • Oracle Communications Cloud Native Core Unified Data Repository
    • UDR (Libgcrypt): CVE-2021-33560.

Oracle Construction and Engineering Risk Matrix

This Critical Patch Update contains 7 new security patches plus additional third party patches noted below for Oracle Construction and Engineering. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21558 Oracle Crystal Ball Installation None No 7.8 Local High Low None Changed High High High 11.1.2.0.000-11.1.2.4.900
CVE-2020-36518 Primavera Gateway Admin (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8, 21.12.0-21.12.1
CVE-2020-36518 Primavera Unifier Document Management (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 17.7-17.12, 18.8, 19.12, 20.12, 21.12
CVE-2022-23437 Primavera Gateway Admin (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 17.12.0-17.12.11, 18.8.0-18.8.14, 19.12.0-19.12.13, 20.12.0-20.12.8
CVE-2020-36518 Primavera P6 Enterprise Project Portfolio Management Web Access (jackson-databind) HTTP No 6.5 Network Low Low None Un-

changed
None None High 17.12.0.0-17.12.20.4, 18.8.0.0-18.8.25.4, 19.12.0.0-19.12.19.0, 20.12.0.0-20.12.14.0, 21.12.0.0-21.12.4.0
CVE-2022-23437 Primavera Unifier Platform, User Interface (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 17.7-17.12, 18.8, 19.12, 20.12, 21.12
CVE-2022-30126 Primavera Unifier Document Management (Apache Tika) None No 5.5 Local Low None Required Un-

changed
None None High 17.7-17.12, 18.8, 19.12, 20.12, 21.12

Additional CVEs addressed are:

  • The patch for CVE-2022-30126 also addresses CVE-2021-33813, and CVE-2022-25169.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Primavera Gateway
    • Admin (Spring Framework): CVE-2022-22965.

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle E-Business Suite. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the July 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (July 2022), My Oracle Support Note 2484000.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle E-Business Suite Information Discovery Packaging issues (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.3-12.2.11
CVE-2022-21566 Oracle Applications Framework Diagnostics HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2.9-12.2.11
CVE-2022-21500 Oracle User Management Proxy User Delegation HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2.4-12.2.11
CVE-2022-21567 Oracle Workflow Worklist HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2.3-12.2.11
CVE-2022-21568 Oracle iReceivables Access Request HTTP No 6.5 Network Low Low None Un-

changed
High None None 12.2.3-12.2.11
CVE-2022-21545 Oracle iRecruitment Candidate Self Service Registration HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.2.3-12.2.11

Oracle Enterprise Manager Risk Matrix

This Critical Patch Update contains 6 new security patches plus additional third party patches noted below for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the July 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2867874.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22721 Enterprise Manager Ops Center Networking (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.4.0.0
CVE-2022-1292 Enterprise Manager Ops Center Networking (OpenSSL) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High 12.4.0.0
CVE-2022-21536 Enterprise Manager Base Platform Policy Framework HTTP Yes 8.1 Network High None None Un-

changed
High High High 13.4.0.0, 13.5.0.0
CVE-2020-5258 Oracle Application Testing Suite Load Testing for Web Apps (Dojo) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 13.3.0.1
CVE-2022-21516 Enterprise Manager Base Platform Enterprise Manager Install HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 13.4.0.0, 13.5.0.0
CVE-2022-29577 Enterprise Manager Base Platform Enterprise Manager Install (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 13.4.0.0, 13.5.0.0

Additional CVEs addressed are:

  • The patch for CVE-2022-1292 also addresses CVE-2021-4160, and CVE-2022-0778.
  • The patch for CVE-2022-22721 also addresses CVE-2022-22720.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Enterprise Manager for MySQL Database
    • EM Plugin: General (Spring Framework): CVE-2022-22965.

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 59 new security patches for Oracle Financial Services Applications. 38 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22963 Oracle Banking Branch Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Cash Management Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Corporate Lending Process Management Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Credit Facilities Process Management Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Electronic Data Exchange for Corporates Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Liquidity Management Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.2, 14.5
CVE-2022-22963 Oracle Banking Origination Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Supply Chain Finance Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Trade Finance Process Management Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2022-22963 Oracle Banking Virtual Account Management Common (Spring Cloud Function) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.5
CVE-2021-41303 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Shiro) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2018-1273 Oracle Financial Services Crime and Compliance Management Studio Studio (Spring Data Commons) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-22978 Oracle Financial Services Crime and Compliance Management Studio Studio (Spring Security) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2020-9492 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Hadoop) HTTP No 8.8 Network Low Low None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2020-9492 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Solr) HTTP No 8.8 Network Low Low None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-24729 Oracle Financial Services Analytical Applications Infrastructure Others (CKEditor) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1
CVE-2020-36518 Oracle Financial Services Analytical Applications Infrastructure Others (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1
CVE-2022-24729 Oracle Financial Services Behavior Detection Platform Third Party (CKEditor) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1
CVE-2020-36518 Oracle Financial Services Behavior Detection Platform Web UI (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.0, 8.0.8.0, 8.1.1.0-8.1.2.1
CVE-2021-36090 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.8.2.0, 8.0.8.3.0
CVE-2021-38296 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Spark) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.0.8.2.0, 8.0.8.3.0
CVE-2022-25647 Oracle Financial Services Crime and Compliance Management Studio Studio (Google GSON) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.8.2.0, 8.0.8.3.0
CVE-2020-36518 Oracle Financial Services Crime and Compliance Management Studio Studio (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.8.2.0, 8.0.8.3.0
CVE-2021-37714 Oracle Financial Services Crime and Compliance Management Studio Studio (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-24729 Oracle Financial Services Enterprise Case Management Installers (CKEditor) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1
CVE-2020-36518 Oracle Financial Services Enterprise Case Management Installers (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0-8.1.2.1
CVE-2022-24729 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition User Interface (CKEditor) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.0, 8.0.8.0
CVE-2020-36518 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition User Interface (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.7.0, 8.0.8.0
CVE-2021-40690 Oracle FLEXCUBE Private Banking Infrastructure (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.1
CVE-2021-43859 Oracle FLEXCUBE Private Banking Infrastructure (XStream) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.1
CVE-2020-7712 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache ZooKeeper) HTTP No 7.2 Network Low High None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2021-23337 Oracle Financial Services Crime and Compliance Management Studio Studio (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-21544 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 7.1 Network High Low Required Un-

changed
High High High 12.1-12.4, 14.0-14.3, 14.5
CVE-2022-23181 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Tomcat) None No 7.0 Local High Low None Un-

changed
High High High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-21582 Oracle Banking Trade Finance Infrastructure HTTP No 6.7 Network High Low Required Un-

changed
High High Low 14.5
CVE-2022-21585 Oracle Banking Trade Finance Infrastructure HTTP No 6.7 Network High Low Required Un-

changed
High High Low 14.5
CVE-2022-21428 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.7 Network High Low Required Un-

changed
High High Low 12.1-12.4, 14.0-14.3, 14.5
CVE-2022-21578 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.7 Network High Low Required Un-

changed
High High Low 12.1-12.4, 14.0-14.3, 14.5
CVE-2021-44832 Oracle FLEXCUBE Private Banking Infrastructure (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.1
CVE-2022-23437 Oracle Banking Deposits and Lines of Credit Servicing Web UI (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 2.7
CVE-2021-43797 Oracle Banking Deposits and Lines of Credit Servicing Web UI (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 2.7
CVE-2022-23437 Oracle Banking Party Management Web UI (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 2.7
CVE-2021-43797 Oracle Banking Party Management Web UI (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 2.7
CVE-2021-43797 Oracle Banking Platform SECURITY (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 2.6.2
CVE-2022-23437 Oracle Financial Services Crime and Compliance Management Studio Studio (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-22971 Oracle Financial Services Crime and Compliance Management Studio Studio (Spring Framework) HTTP No 6.5 Network Low Low None Un-

changed
None None High 8.0.8.2.0, 8.0.8.3.0
CVE-2022-23437 Oracle FLEXCUBE Universal Banking Infrastructure (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 12.4
CVE-2022-21583 Oracle Banking Trade Finance Infrastructure HTTP No 6.4 Network High Low None Un-

changed
High Low Low 14.5
CVE-2022-21584 Oracle Banking Trade Finance Infrastructure HTTP No 6.4 Network High Low Required Un-

changed
High High None 14.5
CVE-2022-21586 Oracle Banking Trade Finance Infrastructure HTTP No 6.4 Network High Low Required Un-

changed
High High None 14.5
CVE-2022-21576 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.4 Network High Low None Un-

changed
High Low Low 12.3, 12.4, 14.0-14.3, 14.5
CVE-2022-21577 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.4 Network High Low Required Un-

changed
High High None 12.1-12.4, 14.0-14.3, 14.5
CVE-2022-21579 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 6.4 Network High Low Required Un-

changed
High High None 12.1-12.4, 14.0-14.3, 14.5
CVE-2021-41184 Oracle Banking Platform SECURITY (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.9, 2.12
CVE-2022-21581 Oracle Banking Trade Finance Infrastructure HTTP No 5.9 Network High Low Required Un-

changed
Low High Low 14.5
CVE-2022-21580 Oracle Financial Services Revenue Management and Billing Infrastructure HTTP No 5.9 Network High Low Required Un-

changed
High Low Low 2.9.0.0.0, 2.9.0.1.0, 3.0.0.0.0-3.2.0.0.0, 4.0.0.0.0
CVE-2022-24823 Oracle Financial Services Crime and Compliance Management Studio Studio (Netty) None No 5.5 Local Low Low None Un-

changed
High None None 8.0.8.2.0, 8.0.8.3.0
CVE-2021-34429 Oracle Financial Services Crime and Compliance Management Studio Studio (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.0.8.2.0, 8.0.8.3.0
CVE-2021-29425 Oracle FLEXCUBE Core Banking Securities (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 5.2, 11.6-11.8, 11.10

Additional CVEs addressed are:

  • The patch for CVE-2018-1273 also addresses CVE-2018-1259, and CVE-2018-1274.
  • The patch for CVE-2021-23337 also addresses CVE-2020-28500.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2022-22971 also addresses CVE-2022-22970.
  • The patch for CVE-2022-22978 also addresses CVE-2022-22976.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.

Oracle Food and Beverage Applications Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Food and Beverage Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Hospitality Inventory Management Installation (ODP for .NET) Oracle Net Yes 7.5 Network High None Required Un-

changed
High High High 9.1
CVE-2021-41184 Oracle Hospitality Inventory Management Receipt (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.1
CVE-2021-41184 Oracle Hospitality Materials Control Receipt (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 18.1

Additional CVEs addressed are:

  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.

Oracle Fusion Middleware Risk Matrix

This Critical Patch Update contains 38 new security patches plus additional third party patches noted below for Oracle Fusion Middleware. 32 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update July 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update July 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2880163.2.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-42575 Oracle Middleware Common Libraries and Tools Third Party Patch (AntiSamy) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-23457 Oracle WebLogic Server Centralized Third Party Jars (OWASP Enterprise Security API) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-23450 Oracle WebLogic Server Sample apps (Dojo) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.4.0, 14.1.1.0.0
CVE-2022-22965 Oracle WebLogic Server Third Party Tools, Samples (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2019-10082 Oracle HTTP Server SSL Module (Apache HTTP Server) HTTP Yes 9.1 Network Low None None Un-

changed
High None High 12.2.1.3.0, 12.2.1.4.0
CVE-2020-35169 Oracle HTTP Server SSL Module (Dell BSAFE Micro Edition Suite) HTTPS Yes 9.1 Network Low None None Un-

changed
High High None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-23926 Oracle Middleware Common Libraries and Tools Thirdparty Patch (Apache XMLBeans) HTTP Yes 9.1 Network Low None None Un-

changed
High None High 12.2.1.3.0, 12.2.1.4.0
CVE-2020-35169 Oracle Security Service C Oracle SSL API (Dell BSAFE Micro Edition Suite) HTTPS Yes 9.1 Network Low None None Un-

changed
High High None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-26291 Oracle WebLogic Server Centralized Third Party Jars (Apache Maven) HTTP Yes 9.1 Network Low None None Un-

changed
High High None 12.2.1.3.0, 12.2.1.4.0
CVE-2020-35169 Oracle Weblogic Server Proxy Plug-in SSL Module (Dell BSAFE Micro Edition Suite) HTTPS Yes 9.1 Network Low None None Un-

changed
High High None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-39139 Oracle WebCenter Portal Security Framework (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-2351 Oracle WebLogic Server Installer (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2020-11987 Oracle WebLogic Server Centralized Third Party Jars (Apache Batik) HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2019-0227 Oracle BI Publisher BI Publisher Security (Apache Axis) HTTP Yes 7.5 Adjacent

Network
High None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2020-36518 Oracle Coherence Centralized Thirdparty Jars (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.1.1.0.0
CVE-2022-21570 Oracle Coherence Core T3, IIOP Yes 7.5 Network Low None None Un-

changed
None None High 3.7.1.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2020-36518 Oracle Global Lifecycle Management NextGen OUI Framework NextGen Installer issues (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 13.9.4.2.10
CVE-2021-42340 Oracle Managed File Transfer MFT Runtime Server (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-37714 Oracle Middleware Common Libraries and Tools Thirdparty Patch (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21562 Oracle SOA Suite Fabric Layer HTTP Yes 7.5 Network Low None None Un-

changed
None High None 12.2.1.3.0, 12.2.1.4.0
CVE-2020-36518 Oracle WebLogic Server Centralized Third Party Jars (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-24839 Oracle WebLogic Server Centralized Third Party Jars (NekoHTML) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2020-28491 Oracle WebLogic Server Centralized Third Party Jars (jackson-dataformats-binary) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-40690 Oracle WebLogic Server Centralized Thirdparty Jars (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21552 Oracle WebCenter Content Search HTTP Yes 7.2 Network Low None None Changed Low Low None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-35940 Oracle HTTP Server SSL Module (Apache Portable Runtime) None No 7.1 Local Low Low None Un-

changed
High None High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-30129 Oracle Global Lifecycle Management NextGen OUI Framework NextGen Installer issues (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High Prior to 13.9.4.2.10
CVE-2022-23437 Oracle Global Lifecycle Management NextGen OUI Framework NextGen Installer issues (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High Prior to 13.9.4.2.10
CVE-2022-21548 Oracle WebLogic Server Core T3, IIOP Yes 6.5 Network Low None None Un-

changed
None Low Low 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2020-11023 Oracle Business Intelligence Enterprise Edition Service Administration UI (JQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.9.0.0.0
CVE-2020-1927 Oracle HTTP Server SSL Module (Apache HTTP Server) HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.3.0, 12.2.1.4.0
CVE-2022-29577 Oracle WebLogic Server Centralized Third Party Jars (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21575 Oracle WebCenter Sites Support Tools User Interface HTTP No 6.0 Network Low High None Un-

changed
High Low Low 4.4.2 and Prior
CVE-2022-21557 Oracle WebLogic Server Web Container None No 5.7 Local High High None Un-

changed
High High None 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2019-0220 Oracle HTTP Server Web Listener (Apache HTTP Server) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.2.1.3.0
CVE-2022-21560 Oracle WebLogic Server Core T3, IIOP Yes 5.3 Network Low None None Un-

changed
None None Low 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21564 Oracle WebLogic Server Web Services T3, IIOP Yes 5.3 Network Low None None Un-

changed
None None Low 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21523 Oracle BI Publisher BI Publisher Security HTTP No 4.3 Network Low Low None Un-

changed
Low None None 12.2.1.3.0, 12.2.1.4.0

Additional CVEs addressed are:

  • The patch for CVE-2019-0227 also addresses CVE-2018-8032.
  • The patch for CVE-2020-11023 also addresses CVE-2020-11022.
  • The patch for CVE-2020-35169 also addresses CVE-2020-26184, CVE-2020-26185, and CVE-2020-29507.
  • The patch for CVE-2021-39139 also addresses CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153, and CVE-2021-39154.
  • The patch for CVE-2021-42340 also addresses CVE-2020-9484, and CVE-2022-23181.
  • The patch for CVE-2021-42575 also addresses CVE-2021-35043.
  • The patch for CVE-2022-23457 also addresses CVE-2022-24891.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle BI Publisher
    • Web Service API (Spring Framework): CVE-2022-22965, CVE-2020-5397 and CVE-2020-5398.
  • Oracle Business Intelligence Enterprise Edition
    • Analytics Server (Spring Framework): CVE-2022-22965, CVE-2020-5397 and CVE-2020-5398.
  • Oracle Data Integrator
    • Runtime Java agent for ODI (Spring Framework): CVE-2022-22965, CVE-2020-5397 and CVE-2020-5398.
  • Oracle Identity Management Suite
    • Installer (Spring Framework): CVE-2022-22965, CVE-2020-5397 and CVE-2020-5398.
  • Oracle Identity Manager Connector
    • General and Misc (Spring Framework): CVE-2022-22965, CVE-2020-5397 and CVE-2020-5398.
  • Oracle Middleware Common Libraries and Tools
    • Third Party Patch (Spring Framework): CVE-2022-22965, CVE-2020-5397 and CVE-2020-5398.

Oracle Health Sciences Applications Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-36518 Oracle Health Sciences Empirica Signal Web Services (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 9.1.0.52, 9.2.0.52
CVE-2019-10086 Oracle Health Sciences Data Management Workbench User Interface (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 2.5.2.1, 3.0.0.0
CVE-2021-23337 Oracle Health Sciences Data Management Workbench User Interface (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 2.5.2.1, 3.0.0.0
CVE-2021-44832 Oracle Health Sciences Data Management Workbench User Interface (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 2.5.2.1, 3.0.0.0, 3.1.0.3
CVE-2022-21518 Oracle Health Sciences Data Management Workbench User Interface HTTP No 6.5 Network Low Low None Un-

changed
High None None 2.4.8.7, 2.5.2.1
CVE-2021-29425 Oracle Health Sciences Data Management Workbench User Interface (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 2.5.2.1, 3.0.0.0

Additional CVEs addressed are:

  • The patch for CVE-2021-23337 also addresses CVE-2020-28500.

Oracle HealthCare Applications Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle HealthCare Applications. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-33813 Oracle Healthcare Foundation Upload Service (Apache Tika) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.1.0, 8.2.0, 8.2.1
CVE-2022-23437 Oracle Health Sciences Information Manager Health Policy Engine (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 3.0.0.1, 3.0.1.0-3.0.5.0
CVE-2021-36374 Oracle Health Sciences Information Manager Health Policy Engine (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 3.0.0.1, 3.0.1.0-3.0.5.0

Additional CVEs addressed are:

  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.

Oracle Hospitality Applications Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Hospitality Applications. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-31805 Oracle Hospitality OPERA 5 Login (Apache Struts) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 5.6
CVE-2022-29885 Oracle Hospitality Cruise Shipboard Property Management System Next-Gen SPMS (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 20.2.1

Oracle Java SE Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle Java SE. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-34169 Oracle Java SE, Oracle GraalVM Enterprise Edition JAXP (Xalan-J) Multiple Yes 7.5 Network Low None None Un-

changed
None High None Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 See Note 1
CVE-2022-25647 Oracle GraalVM Enterprise Edition Native Image (Gson) None No 6.2 Local Low None None Un-

changed
None None High Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0
CVE-2022-21541 Oracle Java SE, Oracle GraalVM Enterprise Edition Hotspot Multiple Yes 5.9 Network High None None Un-

changed
None High None Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 See Note 1
CVE-2022-21540 Oracle Java SE, Oracle GraalVM Enterprise Edition Hotspot Multiple Yes 5.3 Network Low None None Un-

changed
Low None None Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2, 22.1.0 See Note 1
CVE-2022-21549 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None Low None Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2, 22.1.0 See Note 1

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

Oracle JD Edwards Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle JD Edwards. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-22931 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech – Cloud (Node.js) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 9.2.6.1 and prior
CVE-2021-31684 JD Edwards EnterpriseOne Orchestrator E1 IOT Orchestrator (JSON Smart) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 9.2.6.3 and prior
CVE-2022-21542 JD Edwards EnterpriseOne Tools Web Runtime HTTP No 7.4 Network Low Low None Changed Low Low Low 9.2.6.3 and prior
CVE-2022-21561 JD Edwards EnterpriseOne Tools Web Runtime HTTP No 6.5 Network Low Low None Un-

changed
High None None 9.2.6.3 and prior
CVE-2021-41184 JD Edwards EnterpriseOne Tools Web Runtime (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.2.6.3 and prior
CVE-2022-21532 JD Edwards EnterpriseOne Orchestrator E1 IOT Orchestrator HTTP No 4.3 Network Low Low None Un-

changed
Low None None 9.2.6.3 and prior

Additional CVEs addressed are:

  • The patch for CVE-2021-22931 also addresses CVE-2021-22939, and CVE-2021-22940.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.

Oracle MySQL Risk Matrix

This Critical Patch Update contains 34 new security patches plus additional third party patches noted below for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-31805 MySQL Enterprise Monitor Monitoring: General (Apache Struts) Multiple Yes 9.8 Network Low None None Un-

changed
High High High 8.0.30 and prior
CVE-2022-1292 MySQL Server Server: Packaging (OpenSSL) MySQL Protocol Yes 9.8 Network Low None None Un-

changed
High High High 5.7.38 and prior, 8.0.29 and prior
CVE-2022-1292 MySQL Workbench Workbench (OpenSSL) MySQL Workbench Yes 9.8 Network Low None None Un-

changed
High High High 8.0.29 and prior
CVE-2022-21824 MySQL Cluster Cluster: General (Node.js) Multiple Yes 8.2 Network Low None None Un-

changed
None Low High 8.0.29 and prior
CVE-2022-27778 MySQL Server Server: Packaging (cURL) MySQL Protocol Yes 8.1 Network Low None Required Un-

changed
None High High 5.7.38 and prior, 8.0.29 and prior
CVE-2021-22119 MySQL Enterprise Monitor Monitoring: General (Spring Security) Multiple Yes 7.5 Network Low None None Un-

changed
None None High 8.0.25 and prior
CVE-2018-25032 MySQL Server Server: Compiling (zlib) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.7.38 and prior, 8.0.29 and prior
CVE-2022-23308 MySQL Workbench Workbench (libxml2) MySQL Workbench Yes 7.5 Network Low None None Un-

changed
None None High 8.0.29 and prior
CVE-2020-26237 MySQL Enterprise Monitor Monitoring: General (highlight.js) Multiple No 6.8 Network Low Low Required Changed None High None 8.0.30 and prior
CVE-2022-21556 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low High None Un-

changed
None High High 8.0.28 and prior
CVE-2022-21569 MySQL Server Server: Optimizer MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21550 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.36 and prior,7.5.26 and prior, 7.6.22 and prior, and 8.0.29 and prior
CVE-2022-21519 MySQL Cluster Cluster: General Multiple Yes 5.9 Network High None None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21527 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.29 and prior
CVE-2022-21528 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.29 and prior
CVE-2022-21509 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.29 and prior
CVE-2022-22968 MySQL Enterprise Monitor Service Manager (Spring Framework) Multiple Yes 5.3 Network Low None None Un-

changed
None Low None 8.0.29 and prior
CVE-2022-21539 MySQL Server InnoDB MySQL Protocol No 5.0 Network High Low None Un-

changed
Low Low Low 8.0.29 and prior
CVE-2022-21517 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21537 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21547 MySQL Server Server: Federated MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21525 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21526 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21529 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21530 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21531 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21553 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21515 MySQL Server Server: Options MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.38 and prior, 8.0.29 and prior
CVE-2022-21455 MySQL Server Server: PAM Auth Plugin MySQL Protocol No 4.9 Network Low High None Un-

changed
None High None 8.0.28 and prior
CVE-2022-21534 MySQL Server Server: Stored Procedure MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21522 MySQL Server Server: Stored Procedure MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 8.0.29 and prior
CVE-2022-21555 MySQL Shell for VS Code Shell: GUI None No 4.2 Local Low High Required Changed Low Low None 1.1.8 and prior
CVE-2022-21538 MySQL Server Server: Security: Encryption MySQL Protocol No 3.1 Network High Low None Un-

changed
None None Low 8.0.29 and prior
CVE-2022-21535 MySQL Shell Shell: General/Core Client None No 2.5 Local High None Required Un-

changed
None None Low 8.0.28 and prior

Additional CVEs addressed are:

  • The patch for CVE-2022-21824 also addresses CVE-2021-44531, CVE-2021-44532, and CVE-2021-44533.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • MySQL Enterprise Monitor
    • Service Manager (OpenSSL): CVE-2022-1292.

Oracle PeopleSoft Risk Matrix

This Critical Patch Update contains 11 new security patches for Oracle PeopleSoft. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21543 PeopleSoft Enterprise PeopleTools Updates Environment Mgmt HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.58, 8.59
CVE-2020-36518 PeopleSoft Enterprise PeopleTools Elastic Search (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.58, 8.59
CVE-2018-25032 PeopleSoft Enterprise PeopleTools PeopleSoft CDA (zlib) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.58, 8.59
CVE-2022-24729 PeopleSoft Enterprise PeopleTools Rich Text Editor (CKEditor) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.58, 8.59
CVE-2021-31684 PeopleSoft Enterprise PeopleTools Security (JSON Smart) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.58, 8.59
CVE-2022-23437 PeopleSoft Enterprise PeopleTools Security (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 8.58, 8.59
CVE-2022-21520 PeopleSoft Enterprise PeopleTools Fluid Core HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.58, 8.59
CVE-2020-7656 PeopleSoft Enterprise PeopleTools PeopleSoft CDA (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.58
CVE-2021-41182 PeopleSoft Enterprise PeopleTools XML Publisher (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.58, 8.59
CVE-2022-21521 PeopleSoft Enterprise PeopleTools XML Publisher HTTP No 4.9 Network Low High None Un-

changed
High None None 8.58, 8.59
CVE-2022-21512 PeopleSoft Enterprise PeopleTools Integration Broker None No 4.4 Local Low High None Un-

changed
High None None 8.58, 8.59

Additional CVEs addressed are:

  • The patch for CVE-2021-41182 also addresses CVE-2021-41183, and CVE-2021-41184.
  • The patch for CVE-2022-24729 also addresses CVE-2022-24728.

Oracle Policy Automation Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Policy Automation. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-44832 Oracle Policy Automation Determinations Engine (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.0-12.2.24
CVE-2021-44832 Oracle Policy Automation for Mobile Devices Core Functionality (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.0-12.2.24
CVE-2021-41184 Oracle Policy Automation Determinations Engine (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.0-12.2.25

Additional CVEs addressed are:

  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.

Oracle Retail Applications Risk Matrix

This Critical Patch Update contains 17 new security patches for Oracle Retail Applications. 13 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22965 Oracle Retail Bulk Data Integration BDI Job Scheduler (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 16.0.3
CVE-2022-22965 Oracle Retail Customer Management and Segmentation Foundation Security (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 17.0, 18.0, 19.0
CVE-2022-23305 Oracle Retail Extract Transform and Load Mathematical Operators (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 13.2.5
CVE-2022-22965 Oracle Retail Financial Integration PeopleSoft Integration Bugs (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2022-22965 Oracle Retail Integration Bus RIB Kernal (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2022-22965 Oracle Retail Merchandising System Foundation (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 16.0.3, 19.0.1
CVE-2021-29505 Oracle Retail Customer Insights Other (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 15.0.2, 16.0.2
CVE-2021-22118 Oracle Retail Customer Insights Other (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 16.0.2
CVE-2022-25647 Oracle Retail Order Broker System Administration (Google GSON) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 18.0, 19.1
CVE-2020-36518 Oracle Retail Sales Audit others (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 15.0.3.1
CVE-2019-10086 Oracle Retail Allocation General (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 15.0.3.1, 16.0.3
CVE-2019-10086 Oracle Retail Sales Audit others (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 16.0.3
CVE-2021-44832 Oracle Retail Order Broker Internal Operations (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 18.0, 19.1
CVE-2021-44832 Oracle Retail Xstore Point of Service Xenvironment (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.1
CVE-2021-29425 Oracle Retail Merchandising System Foundation (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 16.0.3, 19.0.1
CVE-2021-29425 Oracle Retail Pricing Pricing – Security (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 19.0.1
CVE-2021-29425 Oracle Retail Xstore Point of Service Xenvironment (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 17.0.4, 18.0.3, 19.0.2, 20.0.1

Additional CVEs addressed are:

  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle Siebel CRM Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Siebel CRM. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-31812 Siebel Apps – Field Service Smart Answer (Apache PDFBox) None No 5.5 Local Low None Required Un-

changed
None None High 22.6 and prior

Additional CVEs addressed are:

  • The patch for CVE-2021-31812 also addresses CVE-2021-31811.

Oracle Supply Chain Risk Matrix

This Critical Patch Update contains 24 new security patches for Oracle Supply Chain. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-10683 Oracle Agile Engineering Data Management Installation Issues (dom4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 6.2.1.0
CVE-2019-0219 Oracle Transportation Management Mobile Applications (Apache cordova-plugin-inappbrowser) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.4.4
CVE-2022-25762 Oracle Agile PLM Security (Apache Tomcat) HTTP Yes 8.6 Network Low None None Un-

changed
High Low Low 9.3.6
CVE-2021-2351 Oracle Agile Product Lifecycle Management for Process Reporting (ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.2.2, 6.2.3
CVE-2020-11987 Oracle Agile Engineering Data Management Installation Issues (Apache Batik) HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 6.2.1.0
CVE-2020-11987 Oracle Product Lifecycle Analytics Installation Issues (Apache Batik) HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 3.6.1
CVE-2021-22118 Oracle Product Lifecycle Analytics Installation Issues (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 3.6.1
CVE-2021-42340 Oracle Agile Engineering Data Management Installation Issues (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 6.2.1.0
CVE-2021-40690 Oracle Agile PLM Security (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 9.3.6
CVE-2020-25649 Oracle Agile PLM Security (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 9.3.6
CVE-2019-0227 Oracle Product Lifecycle Analytics Installation Issues (Apache Axis) HTTP Yes 7.5 Adjacent

Network
High None None Un-

changed
High High High 3.6.1
CVE-2019-10086 Oracle Agile Engineering Data Management Installation Issues (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 6.2.1.0
CVE-2019-10086 Oracle Product Lifecycle Analytics Installation Issues (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 3.6.1
CVE-2021-44832 Oracle Product Lifecycle Analytics Installation Issues (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 3.6.1
CVE-2022-23437 Oracle Agile Engineering Data Management Installation Issues (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 6.2.1.0
CVE-2022-23437 Oracle Agile PLM Security (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 9.3.6
CVE-2022-23437 Oracle Product Lifecycle Analytics Installation Issues (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 3.6.1
CVE-2020-11022 Oracle Agile PLM Security (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.6
CVE-2021-41184 Oracle Agile PLM Security (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.6
CVE-2021-36374 Oracle Agile Engineering Data Management Installation Issues (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 6.2.1.0
CVE-2020-17521 Oracle Agile Engineering Data Management Installation Issues (Apache Groovy) None No 5.5 Local Low Low None Un-

changed
High None None 6.2.1.0
CVE-2021-36374 Oracle Product Lifecycle Analytics Installation Issues (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 3.6.1
CVE-2021-34429 Oracle Autovue for Agile Product Lifecycle Management Internal Operations (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 21.0.2
CVE-2021-29425 Oracle Agile Engineering Data Management Installation Issues (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 6.2.1.0

Additional CVEs addressed are:

  • The patch for CVE-2019-0227 also addresses CVE-2018-8032.
  • The patch for CVE-2020-25649 also addresses CVE-2020-35490, CVE-2020-35491, CVE-2020-35728, CVE-2020-36179, CVE-2020-36180, CVE-2020-36181, CVE-2020-36182, CVE-2020-36183, CVE-2020-36184, CVE-2020-36185, CVE-2020-36186, CVE-2020-36187, CVE-2020-36188, and CVE-2020-36189.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2021-42340 also addresses CVE-2022-23181.

Oracle Systems Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Systems. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21513 Oracle ZFS Storage Appliance Kit Core None No 8.2 Local Low High None Changed High High High 8.8
CVE-2022-24801 Oracle ZFS Storage Appliance Kit Operating System Image Multiple Yes 8.1 Network High None None Un-

changed
High High High 8.8
CVE-2022-21524 Oracle Solaris Filesystem SMB No 7.6 Network Low Low None Un-

changed
Low Low High 11
CVE-2022-21514 Oracle Solaris Remote Administration Daemon Multiple Yes 7.5 Network Low None None Un-

changed
None None High 11
CVE-2022-21533 Oracle Solaris SMB Server None No 5.5 Local Low Low None Un-

changed
None None High 11
CVE-2022-21439 Oracle Solaris Kernel None No 4.2 Local Low High Required Un-

changed
None None High 10, 11
CVE-2022-21563 Oracle ZFS Storage Appliance Kit Core None No 3.4 Local Low High None Un-

changed
None Low Low 8.8

Additional CVEs addressed are:

  • The patch for CVE-2022-24801 also addresses CVE-2018-25032, CVE-2020-29651, CVE-2021-4115, CVE-2022-23308, and CVE-2022-29824.

Oracle Utilities Applications Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Utilities Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-36518 Oracle Utilities Framework General (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.5.0.0.0

Oracle Virtualization Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Virtualization. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21571 Oracle VM VirtualBox Core None No 8.2 Local Low High None Changed High High High Prior to 6.1.36
CVE-2022-21554 Oracle VM VirtualBox Core None No 4.4 Local Low High None Un-

changed
None None High Prior to 6.1.36

Related:

  • No Related Posts

Oracle Security Alert for CVE-2022-21500 – 19 May 2022

Oracle Security Alert Advisory – CVE-2022-21500

Description

This Security Alert addresses vulnerability CVE-2022-21500, which affects some deployments of Oracle E-Business Suite. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. If successfully exploited, this vulnerability may result in the exposure of personally identifiable information (PII).

Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Oracle SaaS cloud environments are not affected by this vulnerability. This vulnerability could affect the E-Business Suite deployments of Oracle Managed Cloud Services customers. Oracle Managed Cloud Services customers should consult their account team for assistance.

Affected Products and Patch Information

Security vulnerabilities addressed by this Security Alert affect the products listed below. The product area is shown in the Patch Availability Document column.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Oracle E-Business Suite, version 12.2 Oracle E-Business Suite

Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Security Alert program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

References

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Security Alert. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product’s risk matrix.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle:

  • Ahmed L Shnawy: CVE-2022-21500
  • Bhat Muneeb: CVE-2022-21500
  • kirti soni: CVE-2022-21500
  • Niteen Kale: CVE-2022-21500
  • Owais Lone: CVE-2022-21500
  • ract hack: CVE-2022-21500
  • SaschA: CVE-2022-21500
  • Vivek Kashyap: CVE-2022-21500

Modification History

Date Note
2022-May-25 Rev 2. Removed version 12.1 from Supported Versions Affected column
2022-May-19 Rev 1. Initial Release

Oracle E-Business Suite Risk Matrix

This Security Alert contains 1 new security patch for Oracle E-Business Suite. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21500 Oracle E-Business Suite Manage Proxies HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2 See Note 1

Notes:

  1. Authentication is required for successful attack, however the user may be self-registered.

    Oracle E-Business Suite 12.1 is not impacted by this vulnerability. Customers should refer to the Patch Availability Document for details.

Related:

  • No Related Posts

Oracle Critical Patch Update Advisory – April 2022

Oracle Critical Patch Update Advisory – April 2022

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 520 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at April 2022 Critical Patch Update: Executive Summary and Analysis.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Engineered Systems Utilities, versions 12.1.0.2, 19c, 21c Oracle Autonomous Health Framework
Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 Enterprise Manager
Enterprise Manager for Peoplesoft, versions 13.4.1.1, 13.5.1.1 Enterprise Manager
Enterprise Manager for Storage Management, version 13.4.0.0 Enterprise Manager
Enterprise Manager Ops Center, version 12.4.0.0 Enterprise Manager
Helidon, versions 1.4.7, 1.4.10, 2.0.0-RC1 Helidon
Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3 Oracle Construction and Engineering Suite
JD Edwards EnterpriseOne Tools, versions prior to 9.2.6.3 JD Edwards
JD Edwards World Security, version A9.4 JD Edwards
Management Cloud Engine, versions 1.5.0 and prior Oracle Management Cloud Engine
Middleware Common Libraries and Tools, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
MySQL Cluster, versions 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior MySQL
MySQL Connectors, versions 8.0.28 and prior MySQL
MySQL Enterprise Monitor, versions 8.0.29 and prior MySQL
MySQL Server, versions 5.7.37 and prior, 8.0.28 and prior MySQL
MySQL Workbench, versions 8.0.28 and prior MySQL
Oracle Advanced Supply Chain Planning, versions 12.1, 12.2 Oracle Supply Chain Products
Oracle Agile Engineering Data Management, version 6.2.1.0 Oracle Supply Chain Products
Oracle Agile PLM, version 9.3.6 Oracle Supply Chain Products
Oracle Agile PLM MCAD Connector, version 3.6 Oracle Supply Chain Products
Oracle Application Express, versions prior to 22.1 Database
Oracle Application Testing Suite, version 13.3.0.1 Enterprise Manager
Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2 Oracle Supply Chain Products
Oracle Banking Deposits and Lines of Credit Servicing, version 2.12.0 Contact Support
Oracle Banking Enterprise Default Management, versions 2.7.1, 2.10.0, 2.12.0 Oracle Banking Platform
Oracle Banking Loans Servicing, version 2.12.0 Contact Support
Oracle Banking Party Management, version 2.7.0 Oracle Banking Platform
Oracle Banking Payments, version 14.5 Contact Support
Oracle Banking Platform, versions 2.6.2, 2.7.1, 2.12.0 Oracle Banking Platform
Oracle Banking Trade Finance, version 14.5 Contact Support
Oracle Banking Treasury Management, version 14.5 Contact Support
Oracle Blockchain Platform, versions prior to 21.1.2 Oracle Blockchain Platform
Oracle Business Intelligence Enterprise Edition, versions 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0 Oracle Analytics
Oracle Business Process Management Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Coherence, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle Commerce Guided Search, version 11.3.2 Oracle Commerce
Oracle Communications ASAP, version 7.3 Oracle Communications ASAP
Oracle Communications Billing and Revenue Management, versions 12.0.0.4, 12.0.0.5 Oracle Communications Billing and Revenue Management
Oracle Communications Cloud Native Core Automated Test Suite, versions 1.8.0, 1.9.0, 22.1.0 Oracle Communications Cloud Native Core Automated Test Suite
Oracle Communications Cloud Native Core Binding Support Function, version 1.11.0 Oracle Communications Cloud Native Core Binding Support Function
Oracle Communications Cloud Native Core Console, versions 1.9.0, 22.1.0 Oracle Communications Cloud Native Core Console
Oracle Communications Cloud Native Core Network Exposure Function, version 22.1.0 Oracle Communications Cloud Native Core Network Exposure Function
Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 1.10.0, 22.1.0 Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Oracle Communications Cloud Native Core Network Repository Function, versions 1.15.0, 1.15.1, 22.1.0 Oracle Communications Cloud Native Core Network Repository Function
Oracle Communications Cloud Native Core Network Slice Selection Function, versions 1.8.0, 22.1.0 Oracle Communications Cloud Native Core Network Slice Selection Function
Oracle Communications Cloud Native Core Policy, versions 1.14.0, 1.15.0, 22.1.0 Oracle Communications Cloud Native Core Policy
Oracle Communications Cloud Native Core Security Edge Protection Proxy, versions 1.7.0, 22.1.0 Oracle Communications Cloud Native Core Security Edge Protection Proxy
Oracle Communications Cloud Native Core Service Communication Proxy, version 1.15.0 Oracle Communications Cloud Native Core Service Communication Proxy
Oracle Communications Cloud Native Core Unified Data Repository, versions 1.15.0, 22.1.0 Oracle Communications Cloud Native Core Unified Data Repository
Oracle Communications Contacts Server, version 8.0.0.6.0 Oracle Communications Contacts Server
Oracle Communications Convergence, versions 3.0.2.2, 3.0.3.0 Oracle Communications Convergence
Oracle Communications Convergent Charging Controller, versions 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0 Oracle Communications Convergent Charging Controller
Oracle Communications Design Studio, versions 7.3.5, 7.4.0-7.4.2 Oracle Communications Design Studio
Oracle Communications Diameter Intelligence Hub, versions 8.0.0-8.2.3 Oracle Communications Diameter Signaling Router
Oracle Communications Diameter Signaling Router, version 8.4.0.0 Oracle Communications Diameter Signaling Router
Oracle Communications EAGLE Application Processor Oracle Communications EAGLE Application Processor
Oracle Communications EAGLE Element Management System, version 46.6 Oracle Communications EAGLE Element Management System
Oracle Communications EAGLE FTP Table Base Retrieval, version 4.5 Oracle Communications EAGLE FTP Table Base Retrieval
Oracle Communications EAGLE LNP Application Processor, versions 10.1, 10.2 Oracle Communications EAGLE LNP Application Processor
Oracle Communications EAGLE Software, versions 46.7.0, 46.8.0-46.8.2, 46.9.1-46.9.3 Oracle Communications EAGLE (Software)
Oracle Communications Element Manager, versions prior to 9.0 Oracle Communications Element Manager
Oracle Communications Evolved Communications Application Server, version 7.1 Oracle Communications Evolved Communications Application Server
Oracle Communications Instant Messaging Server, version 10.0.1.5.0 Oracle Communications Instant Messaging Server
Oracle Communications Interactive Session Recorder, version 6.4 Oracle Communications Interactive Session Recorder
Oracle Communications IP Service Activator, version 7.4.0 Oracle Communications IP Service Activator
Oracle Communications Messaging Server, version 8.1 Oracle Communications Messaging Server
Oracle Communications MetaSolv Solution, version 6.3.1 Oracle Communications MetaSolv Solution
Oracle Communications Network Charging and Control, versions 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0 Oracle Communications Network Charging and Control
Oracle Communications Network Integrity, versions 7.3.2, 7.3.5, 7.3.6 Oracle Communications Network Integrity
Oracle Communications Operations Monitor, versions 4.3, 4.4, 5.0 Oracle Communications Operations Monitor
Oracle Communications Order and Service Management, versions 7.3, 7.4 Oracle Communications Order and Service Management
Oracle Communications Performance Intelligence Center (PIC) Software, versions 10.3.0.0.0-10.3.0.2.1, 10.4.0.1.0-10.4.0.3.1 Oracle Communications Performance Intelligence Center (PIC) Software
Oracle Communications Policy Management, versions 12.5.0.0.0, 12.6.0.0.0 Oracle Communications Policy Management
Oracle Communications Pricing Design Center, versions 12.0.0.4, 12.0.0.5 Oracle Communications Pricing Design Center
Oracle Communications Services Gatekeeper, version 7.0.0.0.0 Oracle Communications Services Gatekeeper
Oracle Communications Session Border Controller, versions 8.4, 9.0 Oracle Communications Session Border Controller
Oracle Communications Session Report Manager, versions prior to 9.0 Oracle Communications Session Report Manager
Oracle Communications Session Route Manager, versions prior to 9.0 Oracle Communications Session Route Manager
Oracle Communications Unified Inventory Management, versions 7.3.4-7.3.5, ,7.4.1-7.4.2 Oracle Communications Unified Inventory Management
Oracle Communications Unified Session Manager, versions 8.2.5, 8.4.5 Oracle Communications Unified Session Manager
Oracle Communications User Data Repository, version 12.4 Oracle Communications User Data Repository
Oracle Communications WebRTC Session Controller, version 7.2.1 Oracle Communications WebRTC Session Controller
Oracle Data Integrator, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Database Server, versions 12.1.0.2, 19c, 21c Database
Oracle Documaker, versions 12.6.0, 12.6.2-12.6.4, 12.7.0 Oracle Insurance Applications
Oracle E-Business Suite, versions 12.2.4-12.2.11, [EBS Cloud Manager and Backup Module] prior to 22.1.1.1, [Enterprise Command Center] 7.0, [Enterprise Information Discovery] 7-9 Oracle E-Business Suite
Oracle Enterprise Communications Broker, versions 3.2, 3.3 Oracle Enterprise Communications Broker
Oracle Enterprise Session Border Controller, versions 8.4, 9.0 Oracle Enterprise Session Border Controller
Oracle Ethernet Switch ES1-24, version 1.3.1 Systems
Oracle Ethernet Switch TOR-72, version 1.2.2 Systems
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.6.0-8.0.9.0, 8.1.0.0-8.1.2.0 Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Behavior Detection Platform, versions 8.0.6.0-8.0.8.0, 8.1.1.0, 8.1.1.1, 8.1.2.0 Oracle Financial Services Behavior Detection Platform
Oracle Financial Services Enterprise Case Management, versions 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0 Oracle Financial Services Enterprise Case Management
Oracle Financial Services Revenue Management and Billing, versions 2.7.0.0, 2.7.0.1, 2.8.0.0 Oracle Financial Services Revenue Management and Billing
Oracle FLEXCUBE Universal Banking, versions 11.83.3, 12.1-12.4, 14.0-14.3, 14.5 Contact Support
Oracle Global Lifecycle Management OPatch Global Lifecycle Management
Oracle GoldenGate, versions prior to 12.3.0.1.2, prior to 23.1 Database
Oracle GoldenGate Application Adapters, versions prior to 23.1 Database
Oracle GoldenGate Big Data and Application Adapters, versions prior to 23.1 Database
Oracle GraalVM Enterprise Edition, versions 20.3.5, 21.3.1, 22.0.0.2 Java SE
Oracle Health Sciences Empirica Signal, versions 9.1.0.6, 9.2.0.0 Health Sciences
Oracle Health Sciences InForm, versions 6.2.1.1, 6.3.2.1, 7.0.0.0 Health Sciences
Oracle Health Sciences InForm Publisher, versions 6.2.1.0, 6.3.1.1 Health Sciences
Oracle Health Sciences Information Manager, versions 3.0.1-3.0.4 HealthCare Applications
Oracle Healthcare Data Repository, versions 8.1.0, 8.1.1 HealthCare Applications
Oracle Healthcare Foundation, versions 7.3.0.1-7.3.0.4 HealthCare Applications
Oracle Healthcare Master Person Index, version 5.0.1 HealthCare Applications
Oracle Healthcare Translational Research, versions 4.1.0, 4.1.1 HealthCare Applications
Oracle Hospitality Suite8, versions 8.10.2, 8.11.0-8.14.0 Oracle Hospitality Suite8
Oracle Hospitality Token Proxy Service, version 19.2 Oracle Hospitality Token Proxy Service
Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Hyperion BI+, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Hyperion Calculation Manager, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Hyperion Data Relationship Management, versions prior to 11.2.8.0, prior to 11.2.9.0 Oracle Enterprise Performance Management
Oracle Hyperion Financial Management, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Hyperion Infrastructure Technology, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Hyperion Planning, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Hyperion Profitability and Cost Management, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Hyperion Tax Provision, versions prior to 11.2.8.0 Oracle Enterprise Performance Management
Oracle Identity Management Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Identity Manager Connector, versions 9.1.0 Fusion Middleware
Oracle iLearning, versions 6.2, 6.3 iLearning
Oracle Insurance Data Gateway, version 1.0.1 Oracle Insurance Applications
Oracle Insurance Insbridge Rating and Underwriting, versions 5.2.0, 5.4.0-5.6.0, 5.6.1 Oracle Insurance Applications
Oracle Insurance Policy Administration, versions 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1 Oracle Insurance Applications
Oracle Insurance Rules Palette, versions 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1 Oracle Insurance Applications
Oracle Internet Directory, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Java SE, versions 7u331, 8u321, 11.0.14, 17.0.2, 18 Java SE
Oracle JDeveloper, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Managed File Transfer, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Middleware Common Libraries and Tools, version 12.2.1.4.0 Fusion Middleware
Oracle NoSQL Database NoSQL Database
Oracle Outside In Technology, versions 8.5.5, 8.5.6 Fusion Middleware
Oracle Payment Interface, versions 19.1, 20.3 Oracle Payment Interface
Oracle Product Lifecycle Analytics, version 3.6.1.0 Oracle Supply Chain Products
Oracle REST Data Services, versions prior to 21.2 Database
Oracle Retail Bulk Data Integration, version 16.0.3 Retail Applications
Oracle Retail Customer Insights, versions 15.0.2, 16.0.2 Retail Applications
Oracle Retail Customer Management and Segmentation Foundation, versions 17.0-19.0 Retail Applications
Oracle Retail Data Extractor for Merchandising, versions 15.0.2, 16.0.2 Retail Applications
Oracle Retail EFTLink, versions 17.0.2, 18.0.1, 19.0.1, 20.0.1, 21.0.0 Retail Applications
Oracle Retail Extract Transform and Load, version 13.2.8 Retail Applications
Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 Retail Applications
Oracle Retail Integration Bus, versions 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 Retail Applications
Oracle Retail Invoice Matching, version 16.0.3 Retail Applications
Oracle Retail Merchandising System, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Service Backbone, versions 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 Retail Applications
Oracle Retail Store Inventory Management, versions 14.0.4.13, 14.1.3.5, 14.1.3.14, 15.0.3.3, 15.0.3.8, 16.0.3.7 Retail Applications
Oracle Retail Xstore Office Cloud Service, versions 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1 Retail Applications
Oracle Retail Xstore Point of Service, versions 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1, 21.0.0 Retail Applications
Oracle SD-WAN Edge, versions 9.0, 9.1 Oracle SD-WAN Edge
Oracle Secure Backup Oracle Secure Backup
Oracle Secure Global Desktop, version 5.6 Virtualization
Oracle Solaris, version 11 Systems
Oracle Solaris Cluster, version 4 Systems
Oracle SQL Developer, versions prior to 21.99 Database
Oracle StorageTek ACSLS, version 8.5.1 Systems
Oracle StorageTek Tape Analytics (STA), version 2.4 Systems
Oracle Taleo Platform, versions prior to 22.1 Oracle Taleo
Oracle Transportation Management, versions 6.4.3, 6.5.1 Oracle Supply Chain Products
Oracle Tuxedo, version 12.2.2.0.0 Fusion Middleware
Oracle Utilities Framework, versions 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0 Oracle Utilities Applications
Oracle VM VirtualBox, versions prior to 6.1.34 Virtualization
Oracle Web Services Manager, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebCenter Sites, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebLogic Server, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle ZFS Storage Appliance Kit, version 8.8 Systems
OSS Support Tools, versions 2.12.42, 18.3 Oracle Support Tools
PeopleSoft Enterprise CS Academic Advisement, version 9.2 PeopleSoft
PeopleSoft Enterprise FIN Cash Management, version 9.2 PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.58, 8.59 PeopleSoft
PeopleSoft Enterprise PRTL Interaction Hub, version 9.1 PeopleSoft
Primavera Unifier, versions 17.7-17.12, 18.8, 19.12, 20.12, 21.12 Oracle Construction and Engineering Suite

Note:

  • Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
  • Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris 10 customers should refer to the latest patch-sets which contain critical security patches detailed in Systems Patch Availability Document. Please see Reference Index of CVE IDs and Solaris Patches (My Oracle Support Note 1448883.1) for more information.
  • Users running Java SE with a browser can download the latest release from https://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product’s risk matrix.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • 4ra1n: CVE-2022-21441
  • Adi Farshteindiker: CVE-2022-21487, CVE-2022-21488
  • Ahmed Shah of Red Canari: CVE-2022-21481
  • Alexander Kornbrust of Red Database Security: CVE-2022-21410
  • AnhNH of Sacombank: CVE-2022-21419, CVE-2022-21448, CVE-2022-21492
  • Anonymous researcher working with Trend Micro’s Zero Day Initiative: CVE-2022-21482, CVE-2022-21490
  • Anthony Weems: CVE-2022-21496
  • Aobo Wang of Chaitin Security Research Lab: CVE-2022-21465, CVE-2022-21471
  • bendtheory: CVE-2022-21468
  • ChauUHM of Sacombank: CVE-2022-21419, CVE-2022-21448, CVE-2022-21492
  • Cl0und of Syclover Security Team: CVE-2022-21420
  • Dimitris Doganos of COSMOTE – Mobile Telecommunications S.A.: CVE-2022-21466
  • Emad Al-Mousa: CVE-2022-21410
  • Harrison Neal: CVE-2022-21411
  • HolyBugx: CVE-2022-21468
  • Iustin Ladunca (youstin): CVE-2022-21468
  • Jangggg of VNPT: CVE-2022-21445, CVE-2022-21497
  • Karan Lyons: CVE-2022-21496
  • Kun Yang of Chaitin Security Research Lab: CVE-2022-21465, CVE-2022-21471
  • lc working with Trend Micro Zero Day Initiative: CVE-2022-21483, CVE-2022-21484, CVE-2022-21489
  • Liboheng of Tophant Starlight laboratory: CVE-2022-21420
  • Lucas Leong (wmliang) of Trend Micro Zero Day Initiative: CVE-2022-21485, CVE-2022-21486
  • Luo Likang of NSFocus Security Team: CVE-2022-21487
  • Markus Loewe: CVE-2022-21443
  • Michael MOSKOPP of Sogeti: CVE-2022-21469
  • Natalia Trojanowska of SecuRing: CVE-2022-21467
  • Neil Madden of ForgeRock: CVE-2022-21449
  • Niels van Gijzen of HackDefense: CVE-2022-21470
  • Oliver Bachtik of NVISO: CVE-2022-21491
  • Omar Younis of Cysiv: CVE-2022-21477
  • osword from SGLAB of Legendsec at Qi’anxin Group: CVE-2022-21434
  • Paulino Calderon of websec mx: CVE-2022-21404
  • peterjson – Security Engineering – VNG Corporation: CVE-2022-21445, CVE-2022-21497
  • r00t4dm: CVE-2022-21421, CVE-2022-21441
  • Sander Meijering of HackDefense: CVE-2022-21470
  • Shihao Wen: CVE-2022-21438, CVE-2022-21459
  • TuanNT of Sacombank: CVE-2022-21419, CVE-2022-21448, CVE-2022-21492
  • TungHT of Sacombank: CVE-2022-21419, CVE-2022-21448, CVE-2022-21492
  • Vikas Khanna: CVE-2022-21450
  • wangze from Codesafe Team of Legendsec at Qi: CVE-2022-21453
  • Yaoguang Chen of Ant Security Light-Year Lab: CVE-2021-2427

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program:

  • Charles Korn
  • John Jiang of Tencent.com
  • thiscodecc of MoyunSec V-Lab
  • Tugay Aslan of Beam Teknoloji

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.

For this quarter, Oracle recognizes the following for contributions to Oracle’s On-Line Presence Security program:

  • Aakash Adhikari (dark_haxor)
  • Abdiwahab Ahmed
  • Adarsh Sreedhar
  • Ahmad Henry Mansour
  • Ahmed Al-Saleem
  • Aitor Herrero Fuentes
  • Andrea NaD
  • Anis Haboubi
  • AR Movies A
  • Fahad Anwar Hussain
  • George Crook
  • Hamoud Al-Helmani
  • Het Vikam
  • Houssem Belhadj Ahmed
  • Hunt4r Bug
  • J Jebarson Immanuel
  • Joaquín Pochat
  • Juhanák, Petr of Accenture
  • Luca Ottoni
  • Manjil Ghimire
  • Marvi Alex
  • Michoel Chaikin of Carsales.com Ltd
  • Mohamed Veten of Resecurity, Inc.
  • Mohamed Selem
  • Mohammed Adam
  • Mohammed Awez Kagdi
  • Nagliy Kot
  • Pankaj Kumar Thakur of Green Tick Nepal Pvt. Ltd.
  • Pim Dieleman of Cadran Consultancy B.V. [2 reports]
  • Prathamesh Bagul
  • Rahul Singh
  • Sagar Elias
  • SEINT
  • Shuvam Adhikari [4 reports]
  • Tarun Garg
  • Tejas Pagare
  • Vikas Srivastava [2 reports]
  • Vismit Sudhir Rakhecha (Druk)
  • Vitali Lavrentikov

Critical Patch Update Schedule

Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:

  • 19 July 2022
  • 18 October 2022
  • 17 January 2023
  • 18 April 2023

References

Modification History

Date Note
2022-June-16 Rev 7. Added credit for CVE-2022-21438.
2022-May-20 Rev 6. Added version 8.5.6 to Outside In Technology. Changed the Component of Middleware Common Libraries and Tools to FMW Remote Diagnostic Agent for CVE-2021-30129. Updated credit name.
2022-May-4 Rev 5. Removed affected version 11.1.1.5.0 of Oracle Identity Manager Connector for CVE-2022-23305. Added a footnote for the change.
2022-May-2 Rev 4. Updated the affected versions Oracle Health Sciences InForm Publisher and Oracle Communications Unified Inventory Management. Note added for MySQL Enterprise Monitor. Note Removed for CVE-2022-21449. Credit Name Updated for CVE-2022-21453
2022-April-29 Rev 3. Updated EM Ops Center additional CVEs for CVE-2021-40438. Updated Oracle ZFS additional CVEs for CVE-2021-39275
2022-April-21 Rev 2. Updated the affected versions for CVE-2022-21449
2022-April-19 Rev 1. Initial Release.

Oracle Database Products Risk Matrices

This Critical Patch Update contains 29 new security patches for Oracle Database Products divided as follows:

  • 5 new security patches for Oracle Database Products
  • 1 new security patch for Oracle Autonomous Health Framework
  • 15 new security patches for Oracle Blockchain Platform
  • No new security patches for Oracle Global Lifecycle Management, but third party patches are provided
  • 5 new security patches for Oracle GoldenGate
  • No new security patches for Oracle NoSQL Database, but third party patches are provided
  • 1 new security patch for Oracle REST Data Services
  • No new security patches for Oracle Secure Backup, but third party patches are provided
  • 2 new security patches for Oracle SQL Developer

Oracle Database Server Risk Matrix

This Critical Patch Update contains 5 new security patches plus additional third party patches noted below for Oracle Database Products. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21410 Oracle Database – Enterprise Edition Sharding Create Any Procedure Oracle Net No 7.2 Network Low High None Un-

changed
High High High 19c
CVE-2022-21498 Java VM Create Procedure Multiple No 6.5 Network Low Low None Un-

changed
None High None 12.1.0.2, 19c, 21c
CVE-2021-41165 Oracle Application Express (CKEditor) Valid User Account HTTP No 5.4 Network Low Low Required Changed Low Low None Prior to 22.1
CVE-2022-21411 RDBMS Gateway / Generic ODBC Connectivity Create Session Oracle Net No 5.4 Network Low Low None Un-

changed
Low Low None 12.1.0.2, 19c, 21c
CVE-2021-22569 Oracle Spatial and Graph MapViewer (protobuf-java) Local Logon Local Logon No 2.8 Local Low Low Required Un-

changed
None None Low 19c, 21c

Additional CVEs addressed are:

  • The patch for CVE-2021-41165 also addresses CVE-2021-41164.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Database – Enterprise Edition Portable Clusterware (Apache MINA SSHD): CVE-2021-30129.
  • Oracle Database – Enterprise Edition RDBMS (LibExpat): CVE-2022-23990 and CVE-2022-23852.
  • Oracle Database Configuration Assistant (Apache Commons Compress): CVE-2019-12402.
  • Oracle Database Enterprise Edition (Apache Tomcat): CVE-2021-42340.

Oracle Autonomous Health Framework Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Autonomous Health Framework. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2464 Engineered Systems Utilities Local Logon Local Logon No 7.8 Local Low Low None Un-

changed
High High High 12.1.0.2, 19c, 21c

Oracle Blockchain Platform Risk Matrix

This Critical Patch Update contains 15 new security patches for Oracle Blockchain Platform. 14 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-23017 Oracle Blockchain Platform Backend (nginx) UDP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 21.1.2
CVE-2020-5245 Oracle Blockchain Platform Backend (Dropwizard-Validation) HTTP No 8.8 Network Low Low None Un-

changed
High High High Prior to 21.1.2
CVE-2021-2351 Oracle Blockchain Platform BCS Console (JDBC, OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 21.1.2 See Note 1
CVE-2020-8174 Oracle Blockchain Platform BCS Console (Node.js) HTTP Yes 8.1 Network High None None Un-

changed
High High High Prior to 21.1.2
CVE-2020-24750 Oracle Blockchain Platform BCS Console (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High Prior to 21.1.2
CVE-2020-28052 Oracle Blockchain Platform BCS Console (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High Prior to 21.1.2
CVE-2019-12399 Oracle Blockchain Platform BCS Console (Apache Kafka) HTTP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 21.1.2
CVE-2020-17527 Oracle Blockchain Platform BCS Console (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 21.1.2
CVE-2020-11612 Oracle Blockchain Platform BCS Console (Netty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 21.1.2
CVE-2019-13565 Oracle Blockchain Platform Backend (OpenLDAP) LDAP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 21.1.2
CVE-2020-8203 Oracle Blockchain Platform BCS Console (Lodash) HTTP Yes 7.4 Network High None None Un-

changed
None High High Prior to 21.1.2
CVE-2019-10086 Oracle Blockchain Platform BCS Console (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low Prior to 21.1.2
CVE-2020-11022 Oracle Blockchain Platform Backend (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 21.1.2
CVE-2021-29425 Oracle Blockchain Platform BCS Console (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None Prior to 21.1.2
CVE-2020-27218 Oracle Blockchain Platform BCS Console (Eclipse Jetty) HTTP Yes 4.8 Network High None None Un-

changed
None Low Low Prior to 21.1.2

Notes:

  1. This is a hotfix on top of version 21.1.2

Additional CVEs addressed are:

  • The patch for CVE-2019-13565 also addresses CVE-2017-14159, CVE-2017-17740, CVE-2017-9287, CVE-2019-13057, CVE-2020-12243, and CVE-2020-15719.
  • The patch for CVE-2020-17527 also addresses CVE-2020-13935.
  • The patch for CVE-2020-24750 also addresses CVE-2020-24616, CVE-2020-25649, and CVE-2020-36189.
  • The patch for CVE-2020-8174 also addresses CVE-2020-10531, CVE-2020-11080, CVE-2020-8172, and CVE-2020-8277.

Oracle Global Lifecycle Management Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Global Lifecycle Management. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Global Lifecycle Management. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Global Lifecycle Management OPatch
    • Centralized Third Party Jars (Apache Commons Compress): CVE-2021-36090, CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.

Oracle GoldenGate Risk Matrix

This Critical Patch Update contains 5 new security patches plus additional third party patches noted below for Oracle GoldenGate. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-26291 Oracle GoldenGate Big Data and Application Adapters General (Apache Maven) HTTP Yes 9.1 Network Low None None Un-

changed
High High None Prior to 23.1
CVE-2022-21442 Oracle GoldenGate OGG Core Library None No 8.8 Local Low Low None Changed High High High Prior to 23.1
CVE-2021-2351 Oracle GoldenGate Application Adapters General (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 23.1
CVE-2019-12086 Oracle GoldenGate Internal Framework (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 12.3.0.1.2
CVE-2019-14862 Oracle GoldenGate Internal Framework (Knockout) HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 12.3.0.1.2

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle GoldenGate Application Adapters
    • General (Apache Log4j): CVE-2022-23305, CVE-2019-17571, CVE-2021-4104 and CVE-2022-23302.

Oracle NoSQL Database Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle NoSQL Database
    • Administration (Netty): CVE-2021-37137, CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-30129 and CVE-2021-37136.
    • Administration (Apache MINA SSHD): CVE-2021-30129.

Oracle REST Data Services Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle REST Data Services. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-29425 Oracle REST Data Services General (Apache Commons IO) HTTP No 4.2 Network High Low None Un-

changed
Low Low None Prior to 21.2

Oracle Secure Backup Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Secure Backup. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Secure Backup. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Secure Backup
    • Oracle Secure Backup (Apache HTTP Server): CVE-2021-44790, CVE-2021-32785, CVE-2021-32786, CVE-2021-32791, CVE-2021-32792 and CVE-2021-44224.
    • Oracle Secure Backup (PHP): CVE-2021-21703.

Oracle SQL Developer Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle SQL Developer. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-44832 Oracle SQL Developer Installation (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 21.4.2
CVE-2020-13956 Oracle SQL Developer Thirdparty Database support (Apache HTTPClient) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None Prior to 21.99

Oracle Commerce Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Commerce. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-39139 Oracle Commerce Guided Search Content Acquisition System (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 11.3.2
CVE-2021-22118 Oracle Commerce Guided Search Content Acquisition System (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 11.3.2
CVE-2021-42340 Oracle Commerce Guided Search Content Acquisition System (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.3.2
CVE-2022-21466 Oracle Commerce Guided Search Tools and Frameworks HTTP Yes 7.5 Network Low None None Un-

changed
High None None 11.3.2
CVE-2021-41165 Oracle Commerce Guided Search Content Acquisition System (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 11.3.2
CVE-2020-13956 Oracle Commerce Guided Search Workbench (HTTPClient) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 11.3.2
CVE-2020-8908 Oracle Commerce Guided Search Workbench (Guava) None No 3.3 Local Low Low None Un-

changed
Low None None 11.3.2

Additional CVEs addressed are:

  • The patch for CVE-2021-22118 also addresses CVE-2020-5421.
  • The patch for CVE-2021-39139 also addresses CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153, and CVE-2021-39154.
  • The patch for CVE-2021-41165 also addresses CVE-2021-41164.

Oracle Communications Applications Risk Matrix

This Critical Patch Update contains 39 new security patches for Oracle Communications Applications. 22 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21431 Oracle Communications Billing and Revenue Management Connection Manager TCP Yes 10.0 Network Low None None Changed High High High 12.0.0.4, 12.0.0.5
CVE-2022-23305 Oracle Communications Messaging Server ISC (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.1
CVE-2022-23990 Oracle Communications MetaSolv Solution User Interface (LibExpat) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 6.3.1
CVE-2022-23305 Oracle Communications Network Integrity Cartridge Deployer Tool (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.3.6
CVE-2022-23305 Oracle Communications Unified Inventory Management Logging (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 7.3.4-7.3.5, 7.4.1-7.4.2
CVE-2020-13936 Oracle Communications Network Integrity TL1 Cartridge (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 7.3.6
CVE-2022-21430 Oracle Communications Billing and Revenue Management Connection Manager TCP No 8.5 Network High Low None Changed High High High 12.0.0.4, 12.0.0.5
CVE-2021-2351 Oracle Communications Billing and Revenue Management Pipeline Configuration Center, Oracle Data Manager, Rated Event Loader (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.0.0.4, 12.0.0.5
CVE-2022-21424 Oracle Communications Billing and Revenue Management Connection Manager TCP No 8.3 Network Low Low None Un-

changed
High High Low 12.0.0.4
CVE-2021-2351 Oracle Communications IP Service Activator Service Activator (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 7.4.0
CVE-2021-2351 Oracle Communications Pricing Design Center Cloud Native Deployment (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.0.0.4, 12.0.0.5
CVE-2021-22118 Oracle Communications Network Integrity MSS Cartridge (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 7.3.6
CVE-2021-36090 Oracle Communications Billing and Revenue Management Billing Care (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.0.0.4
CVE-2022-21422 Oracle Communications Billing and Revenue Management Connection Manager TCP No 7.5 Network High Low None Un-

changed
High High High 12.0.0.4, 12.0.0.5
CVE-2021-42340 Oracle Communications Instant Messaging Server DBPlugin (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 10.0.1.5.0
CVE-2021-40690 Oracle Communications Messaging Server ISC (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.1
CVE-2021-33813 Oracle Communications Messaging Server ISC (Apache Tika) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.1
CVE-2019-10086 Oracle Communications Network Integrity User Interface (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 7.3.6
CVE-2021-44832 Oracle Communications ASAP SRP (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.3
CVE-2021-44832 Oracle Communications Billing and Revenue Management Rated Event Manager, Business Operations Center, Kafka Data Manager (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.0.0.4, 12.0.0.5
CVE-2021-44832 Oracle Communications Convergence Configuration (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 3.0.2.2, 3.0.3.0
CVE-2021-44832 Oracle Communications Convergent Charging Controller Network Gateway (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0
CVE-2021-44832 Oracle Communications IP Service Activator Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.4.0
CVE-2021-44832 Oracle Communications Messaging Server ISC (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 8.1
CVE-2021-44832 Oracle Communications Network Charging and Control Gateway (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0
CVE-2021-44832 Oracle Communications Network Integrity Cartridge Deployer Tool (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.3.6
CVE-2021-44832 Oracle Communications Pricing Design Center REST Services Manager (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.0.0.4, 12.0.0.5
CVE-2021-44832 Oracle Communications Unified Inventory Management Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.3.5, 7.4.1-7.4.2
CVE-2021-43797 Oracle Communications Messaging Server ISC (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 8.1
CVE-2020-6950 Oracle Communications Network Integrity Installer (Eclipse Mojarra) HTTP Yes 6.5 Network Low None Required Un-

changed
High None None 7.3.6
CVE-2019-3740 Oracle Communications Network Integrity Installer (RSA BSAFE Crypto-J) HTTPS Yes 6.5 Network Low None Required Un-

changed
High None None 7.3.2, 7.3.5, 7.3.6
CVE-2021-36374 Oracle Communications Order and Service Management Installer, OSM SDK (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 7.3, 7.4
CVE-2022-24329 Oracle Communications Pricing Design Center REST Services Manager (Kotlin) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.0.0.4, 12.0.0.5
CVE-2021-29425 Oracle Communications Contacts Server File Upload (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 8.0.0.6.0
CVE-2021-29425 Oracle Communications Design Studio OSM Plugin (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 7.3.5, 7.4.0-7.4.2
CVE-2021-29425 Oracle Communications Order and Service Management OSM SDK (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 7.3, 7.4
CVE-2021-29425 Oracle Communications Pricing Design Center REST Service Manager (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.0.0.4, 12.0.0.5
CVE-2021-21275 Oracle Communications Pricing Design Center REST Service Manager (Jacoco) HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 12.0.0.4, 12.0.0.5
CVE-2020-8908 Oracle Communications Pricing Design Center REST Services Manager (Guava) None No 3.3 Local Low Low None Un-

changed
Low None None 12.0.0.4, 12.0.0.5

Additional CVEs addressed are:

  • The patch for CVE-2019-3740 also addresses CVE-2019-3738, and CVE-2019-3739.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.
  • The patch for CVE-2022-23990 also addresses CVE-2022-23852.

Oracle Communications Risk Matrix

This Critical Patch Update contains 149 new security patches plus additional third party patches noted below for Oracle Communications. 98 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22947 Oracle Communications Cloud Native Core Network Exposure Function NEF (Spring Cloud Gateway) HTTP Yes 10.0 Network Low None None Changed High High High 22.1.0
CVE-2022-22947 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (Spring Cloud Gateway) HTTP Yes 10.0 Network Low None None Changed High High High 22.1.0, 1.8.0
CVE-2017-1000353 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite (Jenkins) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.9.0
CVE-2022-22965 Oracle Communications Cloud Native Core Automated Test Suite Automation Test Suite (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.9.0, 22.1.0
CVE-2021-29921 Oracle Communications Cloud Native Core Binding Support Function BSF (Python) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.11.0
CVE-2021-43527 Oracle Communications Cloud Native Core Binding Support Function BSF (NSS) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High 1.11.0
CVE-2022-23221 Oracle Communications Cloud Native Core Console CNC Console (H2) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.9.0
CVE-2022-22965 Oracle Communications Cloud Native Core Console CNC Console (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.9.0, 22.1.0
CVE-2022-22965 Oracle Communications Cloud Native Core Network Exposure Function NEF (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.0
CVE-2022-22965 Oracle Communications Cloud Native Core Network Function Cloud Native Environment DB Tier (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.10.0, 22.1.0
CVE-2020-14343 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (PyYAML) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.10.0
CVE-2022-22965 Oracle Communications Cloud Native Core Network Repository Function OCNRF (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.15.0, 22.1.0
CVE-2021-43527 Oracle Communications Cloud Native Core Network Repository Function OCNRF (NSS) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High 1.15.0, 1.15.1
CVE-2021-29921 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (Python) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.8.0
CVE-2022-22965 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 22.1.0, 1.8.0
CVE-2021-43527 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (NSS) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High 1.8.0
CVE-2021-42392 Oracle Communications Cloud Native Core Policy Policy (H2) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.15.0
CVE-2022-22965 Oracle Communications Cloud Native Core Policy Policy (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.15.0, 22.1.0
CVE-2021-35574 Oracle Communications Cloud Native Core Policy Policy (glibc) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.15.0
CVE-2021-3520 Oracle Communications Cloud Native Core Policy Policy (lz4) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.14.0
CVE-2022-22965 Oracle Communications Cloud Native Core Security Edge Protection Proxy OC SEPP (Spring framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.7.0, 22.1.0
CVE-2022-22965 Oracle Communications Cloud Native Core Unified Data Repository UDR (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.15.0, 22.1.0
CVE-2020-17530 Oracle Communications Diameter Intelligence Hub Visualization (Apache Struts) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2022-23305 Oracle Communications EAGLE FTP Table Base Retrieval Core (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 4.5
CVE-2020-35198 Oracle Communications EAGLE Software Measurements (VxWorks) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 46.7.0, 46.8.0-46.8.2, 46.9.1-46.9.3
CVE-2021-44790 Oracle Communications Element Manager Security (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 9.0
CVE-2021-44790 Oracle Communications Operations Monitor Mediation Engine (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 4.3, 4.4, 5.0
CVE-2022-22965 Oracle Communications Policy Management CMP (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.6.0.0.0
CVE-2021-23450 Oracle Communications Policy Management CMP (dojo) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.6.0.0.0
CVE-2021-43527 Oracle Communications Policy Management CMP (NSS) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High 12.6.0.0.0
CVE-2021-44790 Oracle Communications Session Report Manager General (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 9.0
CVE-2021-44790 Oracle Communications Session Route Manager Third Party (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 9.0
CVE-2022-22965 Oracle SD-WAN Edge Management (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 9.0, 9.1
CVE-2020-36242 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (python-cryptography) HTTP Yes 9.1 Network Low None None Un-

changed
High None High 1.10.0
CVE-2021-3518 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (libxml2) HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 1.10.0
CVE-2021-32626 Oracle Communications Operations Monitor FDP (Redis) TCP No 8.8 Network Low Low None Un-

changed
High High High 4.3, 4.4, 5.0
CVE-2020-10878 Oracle Communications EAGLE LNP Application Processor Platform (Perl) HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 10.1, 10.2
CVE-2020-10878 Oracle Communications Performance Intelligence Center (PIC) Software Platform (Perl) HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 10.3.0.0.0-10.3.0.2.1, 10.4.0.1.0-10.4.0.3.1
CVE-2021-39153 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite Framework (XStream) HTTP No 8.5 Network High Low None Changed High High High 1.9.0
CVE-2021-2351 Oracle Communications Diameter Intelligence Hub Integrated DIH (JDBC, OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.0-8.2.3
CVE-2021-2351 Oracle Communications Services Gatekeeper Third party software/products (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 7.0.0.0.0
CVE-2019-16789 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (ceph) HTTP Yes 8.2 Network Low None None Un-

changed
Low High None 1.10.0
CVE-2019-18276 Oracle Communications Cloud Native Core Policy Policy (GNU Bash) None No 7.8 Local Low Low None Un-

changed
High High High 1.14.0
CVE-2021-22118 Oracle Communications Diameter Intelligence Hub Visualization, Mediation (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2021-3156 Oracle Communications Performance Intelligence Center (PIC) Software Platform (Sudo) None No 7.8 Local Low Low None Un-

changed
High High High 10.3.0.0.0-10.3.0.2.1, 10.4.0.1.0-10.4.0.3.1
CVE-2021-42340 Management Cloud Engine Security (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 1.5.0
CVE-2021-35515 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.8.0
CVE-2021-22946 Oracle Communications Cloud Native Core Binding Support Function CNC BSF (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.11.0
CVE-2020-36518 Oracle Communications Cloud Native Core Console CNC Console (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.9.0
CVE-2021-22946 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.10.0
CVE-2021-22946 Oracle Communications Cloud Native Core Network Repository Function OCNRF (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.15.0, 1.15.1
CVE-2021-3690 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (Undertow) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.8.0
CVE-2021-22946 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (cURL) HTTPS Yes 7.5 Network Low None None Un-

changed
High None None 1.8.0
CVE-2020-28196 Oracle Communications Cloud Native Core Policy Policy (MIT Kerberos) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2021-3807 Oracle Communications Cloud Native Core Policy Policy (ansi-regex) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.15.0
CVE-2020-8231 Oracle Communications Cloud Native Core Policy Policy (libcurl) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.14.0
CVE-2020-29363 Oracle Communications Cloud Native Core Policy Policy (p11-kit) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2021-42340 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.15.0
CVE-2021-22946 Oracle Communications Cloud Native Core Service Communication Proxy SCP (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.15.0
CVE-2021-36090 Oracle Communications Diameter Intelligence Hub Integrated DIH (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0-8.2.3
CVE-2020-11971 Oracle Communications Diameter Intelligence Hub Mediation (Apache Camel) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2021-43859 Oracle Communications Diameter Intelligence Hub Visualization, Database (XStream) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2021-30468 Oracle Communications Diameter Intelligence Hub Visualization, Mediation (Apache CXF) SOAP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2021-42340 Oracle Communications Element Manager Security (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 9.0
CVE-2021-43859 Oracle Communications Policy Management CMP (XStream) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.6.0.0.0
CVE-2021-42340 Oracle Communications Session Report Manager General (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 9.0
CVE-2021-42340 Oracle Communications Session Route Manager Third Party (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 9.0
CVE-2020-25638 Oracle Communications Cloud Native Core Console CNC Console (hibernate-core) HTTP Yes 7.4 Network High None None Un-

changed
High High None 1.9.0
CVE-2021-3712 Oracle Communications Cloud Native Core Console CNC Console (OpenSSL) HTTPS Yes 7.4 Network High None None Un-

changed
High None High 1.9.0
CVE-2021-3712 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (OpenSSL) HTTP Yes 7.4 Network High None None Un-

changed
High None High 1.7.0
CVE-2021-3712 Oracle Communications Cloud Native Core Unified Data Repository UDR (OpenSSL) HTTPS Yes 7.4 Network High None None Un-

changed
High None High 1.15.0
CVE-2021-3712 Oracle Communications Session Border Controller Security (OpenSSL) TLS Yes 7.4 Network High None None Un-

changed
High None High 8.4, 9.0
CVE-2021-3712 Oracle Communications Unified Session Manager Security (OpenSSL) TLS Yes 7.4 Network High None None Un-

changed
High None High 8.2.5, 8.4.5
CVE-2021-3712 Oracle Enterprise Communications Broker Security (OpenSSL) TLS Yes 7.4 Network High None None Un-

changed
High None High 3.2, 3.3
CVE-2021-3712 Oracle Enterprise Session Border Controller Security (OpenSSL) TLS Yes 7.4 Network High None None Un-

changed
High None High 8.4, 9.0
CVE-2022-23181 Oracle Communications Cloud Native Core Policy Policy (Apache Tomcat) None No 7.0 Local High Low None Un-

changed
High High High 1.15.0
CVE-2021-44832 Management Cloud Engine Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.5.0
CVE-2021-44832 Oracle Communications Cloud Native Core Console CNC Console (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.9.0
CVE-2021-44832 Oracle Communications Cloud Native Core Network Function Cloud Native Environment DBTier (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.10.0
CVE-2021-44832 Oracle Communications Cloud Native Core Network Repository Function OCNRF (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.15.0, 1.15.1
CVE-2021-44832 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.8.0
CVE-2021-44832 Oracle Communications Cloud Native Core Policy Policy (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.15.0
CVE-2021-44832 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.7.0
CVE-2021-44832 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.15.0
CVE-2021-44832 Oracle Communications Cloud Native Core Unified Data Repository UDR (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.15.0
CVE-2021-44832 Oracle Communications EAGLE Element Management System Platform (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 46.6
CVE-2021-44832 Oracle Communications EAGLE FTP Table Base Retrieval Core (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 4.5
CVE-2021-44832 Oracle Communications Element Manager Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 9.0
CVE-2021-44832 Oracle Communications Evolved Communications Application Server SDC,SCF (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.1
CVE-2021-44832 Oracle Communications Performance Intelligence Center (PIC) Software Management (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 10.4.0.3
CVE-2021-44832 Oracle Communications Services Gatekeeper OCSG common services – CORE (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.0.0.0.0
CVE-2021-44832 Oracle Communications Session Report Manager General (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 9.0
CVE-2021-44832 Oracle Communications Session Route Manager Third Party (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 9.0
CVE-2021-44832 Oracle Communications User Data Repository Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.4
CVE-2021-44832 Oracle Communications WebRTC Session Controller Admin console, LWPR (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.2.1
CVE-2021-43797 Oracle Communications Cloud Native Core Binding Support Function Policy (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 1.11.0
CVE-2021-30129 Oracle Communications Cloud Native Core Console CNC Console (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 1.9.0
CVE-2021-43797 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 1.8.0
CVE-2021-43797 Oracle Communications Cloud Native Core Policy Policy (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 1.15.0
CVE-2019-3799 Oracle Communications Cloud Native Core Policy Policy (Spring Cloud Config) HTTP Yes 6.5 Network Low None Required Un-

changed
High None None 1.15.0
CVE-2021-43797 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 1.7.0
CVE-2021-43797 Oracle Communications Cloud Native Core Unified Data Repository UDR (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 1.15.0
CVE-2022-23437 Oracle Communications Element Manager Security (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High Prior to 9.0
CVE-2022-23437 Oracle Communications Session Report Manager General (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High Prior to 9.0
CVE-2022-23437 Oracle Communications Session Route Manager Third Party (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High Prior to 9.0
CVE-2021-39140 Oracle Communications Cloud Native Core Policy Policy (XStream) HTTP No 6.3 Network High Low None Changed None None High 1.14.0
CVE-2021-41184 Oracle Communications Interactive Session Recorder Dashboard (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 6.4
CVE-2021-41184 Oracle Communications Operations Monitor Mediation Engine (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 4.3, 4.4, 5.0
CVE-2021-2471 Oracle Communications Cloud Native Core Console CNC Console (MySQL Connectors) HTTP No 5.9 Network High High None Un-

changed
High None High 1.9.0
CVE-2020-14340 Oracle Communications Cloud Native Core Console CNC Console (XNIO) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.9.0
CVE-2020-1971 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (OpenSSL) HTTPS Yes 5.9 Network High None None Un-

changed
None None High 1.10.0
CVE-2021-2471 Oracle Communications Cloud Native Core Network Slice Selection Function NSSF (MySQL) TCP No 5.9 Network High High None Un-

changed
High None High 1.8.0
CVE-2021-21409 Oracle Communications Cloud Native Core Policy Policy (Netty) HTTP Yes 5.9 Network High None None Un-

changed
None High None 1.14.0
CVE-2021-38153 Oracle Communications Cloud Native Core Policy Policy (Apache Kafka) HTTP Yes 5.9 Network High None None Un-

changed
High None None 1.15.0
CVE-2021-2471 Oracle Communications Cloud Native Core Policy Policy (MySQL) HTTP No 5.9 Network High High None Un-

changed
High None High 1.15.0
CVE-2020-14340 Oracle Communications Cloud Native Core Policy Policy (XNIO) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.14.0
CVE-2021-33880 Oracle Communications Cloud Native Core Policy Policy (aaugustin websockets) HTTP Yes 5.9 Network High None None Un-

changed
High None None 1.14.0
CVE-2020-16135 Oracle Communications Cloud Native Core Policy Policy (libssh) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.15.0
CVE-2021-2471 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (MySQL) TCP No 5.9 Network High High None Un-

changed
High None High 1.7.0
CVE-2021-3572 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (python-pip) HTTP No 5.7 Network Low Low Required Un-

changed
None High None 1.10.0
CVE-2021-3572 Oracle Communications Cloud Native Core Policy Policy (python-pip) HTTP No 5.7 Network Low Low Required Un-

changed
None High None 1.15.0
CVE-2021-36374 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 1.9.0
CVE-2021-36374 Oracle Communications Cloud Native Core Binding Support Function CNC BSF (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 1.11.0
CVE-2021-22569 Oracle Communications Cloud Native Core Console CNC Console (protobuf-java) None No 5.5 Local Low None Required Un-

changed
None None High 1.9.0
CVE-2021-22569 Oracle Communications Cloud Native Core Network Repository Function OCNRF (protobuf-java) None No 5.5 Local Low None Required Un-

changed
None None High 1.15.0, 1.15.1
CVE-2020-13434 Oracle Communications Cloud Native Core Policy Policy (SQLite) None No 5.5 Local Low Low None Un-

changed
None None High 1.14.0
CVE-2020-15250 Oracle Communications Cloud Native Core Policy Policy (JUnit) None No 5.5 Local Low None Required Un-

changed
High None None 1.14.0
CVE-2021-28168 Oracle Communications Cloud Native Core Policy Policy (Eclipse Jersey) None No 5.5 Local Low Low None Un-

changed
High None None 1.15.0
CVE-2021-22569 Oracle Communications Cloud Native Core Policy Policy (protobuf-java) None No 5.5 Local Low None Required Un-

changed
None None High 1.15.0
CVE-2021-28168 Oracle Communications Cloud Native Core Unified Data Repository UDR (Eclipse Jersey) None No 5.5 Local Low Low None Un-

changed
High None None 1.15.0
CVE-2021-36374 Oracle Communications Diameter Intelligence Hub Visualization (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2020-17521 Oracle Communications Diameter Signaling Router API Gateway (Apache Groovy) None No 5.5 Local Low Low None Un-

changed
High None None 8.4.0.0
CVE-2022-20615 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite Framework (Jenkins Matrix Project) HTTP No 5.4 Network Low Low Required Changed Low Low None 1.9.0
CVE-2021-20289 Oracle Communications Cloud Native Core Console CNC Console (RESTEasy) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.9.0
CVE-2020-14155 Oracle Communications Cloud Native Core Policy Policy (PCRE) HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 1.15.0
CVE-2021-28169 Oracle Communications Cloud Native Core Policy Policy (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.14.0
CVE-2021-28170 Oracle Communications Cloud Native Core Policy Policy (Jakarta) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 1.14.0
CVE-2020-29582 Oracle Communications Cloud Native Core Policy Policy (Kotlin) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.14.0
CVE-2020-8554 Oracle Communications Cloud Native Core Policy Policy (Kubernetes) HTTP No 5.0 Network High Low None Un-

changed
Low Low Low 1.15.0
CVE-2021-22132 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite Framework (Elasticsearch) HTTP No 4.8 Network High Low Required Un-

changed
High None None 1.8.0
CVE-2021-29425 Oracle Communications Cloud Native Core Policy Policy (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 1.14.0
CVE-2021-29425 Oracle Communications Diameter Intelligence Hub Database (Apache Commons IO) Oracle Net Yes 4.8 Network High None None Un-

changed
Low Low None 8.0.0-8.1.0, 8.2.0-8.2.3
CVE-2021-29425 Oracle Communications Policy Management CMP (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.5.0.0.0
CVE-2021-3521 Oracle Communications Cloud Native Core Network Function Cloud Native Environment OC-CNE (rpm) None No 4.4 Local High Low Required Un-

changed
None High None 1.10.0
CVE-2022-20613 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite (Jenkins Mailer) HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 1.9.0
CVE-2022-20612 Oracle Communications Cloud Native Core Automated Test Suite Automated Test Suite Framework (Jenkins) HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 1.9.0
CVE-2021-22096 Oracle Communications Cloud Native Core Console CNC Console (Spring boot) HTTP No 4.3 Network Low Low None Un-

changed
None Low None 1.9.0
CVE-2021-22096 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Spring Framework) HTTP No 4.3 Network Low Low None Un-

changed
None Low None 1.15.0
CVE-2021-3200 Oracle Communications Cloud Native Core Policy Signaling (libsolv) None No 3.3 Local Low None Required Un-

changed
None None Low 1.15.0

Additional CVEs addressed are:

  • The patch for CVE-2017-1000353 also addresses CVE-2018-1000067, CVE-2018-1000068, CVE-2018-1000192, CVE-2018-1000193, CVE-2018-1000194, CVE-2018-1000195, CVE-2018-1999001, CVE-2018-1999002, CVE-2018-1999003, CVE-2018-1999004, CVE-2018-1999005, CVE-2018-1999007, CVE-2018-6356, CVE-2019-1003049, CVE-2019-1003050, CVE-2019-10383, and CVE-2019-10384.
  • The patch for CVE-2019-16789 also addresses CVE-2019-16785, CVE-2019-16786, and CVE-2019-16792.
  • The patch for CVE-2019-18276 also addresses CVE-2021-27568.
  • The patch for CVE-2020-10878 also addresses CVE-2020-10543, and CVE-2020-12723.
  • The patch for CVE-2020-13434 also addresses CVE-2020-15358.
  • The patch for CVE-2020-35198 also addresses CVE-2020-28895.
  • The patch for CVE-2020-36242 also addresses CVE-2020-25659.
  • The patch for CVE-2020-8231 also addresses CVE-2020-8284, CVE-2020-8285, and CVE-2020-8286.
  • The patch for CVE-2021-21409 also addresses CVE-2021-21295.
  • The patch for CVE-2021-22132 also addresses CVE-2021-22134, CVE-2021-22144, and CVE-2021-22145.
  • The patch for CVE-2021-22946 also addresses CVE-2021-22897, CVE-2021-22898, CVE-2021-22901, CVE-2021-22947, and CVE-2021-33560.
  • The patch for CVE-2021-28169 also addresses CVE-2019-10247.
  • The patch for CVE-2021-30468 also addresses CVE-2021-22696, and CVE-2021-40690.
  • The patch for CVE-2021-32626 also addresses CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, and CVE-2021-41099.
  • The patch for CVE-2021-3518 also addresses CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3517, and CVE-2021-3537.
  • The patch for CVE-2021-35515 also addresses CVE-2021-35516, CVE-2021-35517, and CVE-2021-36090.
  • The patch for CVE-2021-35574 also addresses CVE-2019-13750, CVE-2019-13751, CVE-2019-18218, CVE-2019-19603, CVE-2019-20838, CVE-2019-5827, CVE-2020-13435, CVE-2020-14155, CVE-2021-20231, CVE-2021-20232, CVE-2021-23840, CVE-2021-23841, CVE-2021-27645, CVE-2021-33574, CVE-2021-3445, CVE-2021-3580, CVE-2021-35942, CVE-2021-36084, CVE-2021-36085, CVE-2021-36086, and CVE-2021-36087.
  • The patch for CVE-2021-3572 also addresses CVE-2019-20916.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2021-3712 also addresses CVE-2021-3711.
  • The patch for CVE-2021-39153 also addresses CVE-2021-39139, CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39154, and CVE-2021-43859.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2021-44790 also addresses CVE-2021-44224.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.
  • The patch for CVE-2022-20613 also addresses CVE-2022-20614.
  • The patch for CVE-2022-22965 also addresses CVE-2022-22963.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications Cloud Native Core Policy
    • Policy (Apache Santuario XML Security For Java): CVE-2021-40690.
    • Policy (Spring Integration): CVE-2020-5413.
  • Oracle Communications EAGLE Application Processor
    • Platform (Perl): CVE-2020-10878, CVE-2020-10543 and CVE-2020-12723.

Oracle Construction and Engineering Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Construction and Engineering. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-23450 Primavera Unifier Platform (dojo) HTTP No 7.6 Network Low Low None Un-

changed
Low Low High 17.7-17.12, 18.8, 19.12, 20.12, 21.12
CVE-2021-44832 Instantis EnterpriseTrack Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 17.1, 17.2, 17.3
CVE-2021-41184 Primavera Unifier User Interface (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 17.7-17.12, 18.8, 19.12, 20.12, 21.12

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle E-Business Suite. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the April 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (April 2022), My Oracle Support Note 2484000.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle E-Business Suite Cloud Manager and Cloud Backup Module Logging (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High EBS Cloud Manager and Backup Module: Prior to 22.1.1.1
CVE-2021-44832 Oracle E-Business Suite Information Discovery Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Enterprise Information Discovery: 7-9 See Note 1
CVE-2021-44832 Oracle Enterprise Command Center Framework Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Enterprise Command Center: 7.0 See Note 1
CVE-2022-21468 Oracle Applications Framework Popups HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.4-12.2.11
CVE-2022-21477 Oracle Applications Framework Attachments, File Upload HTTP No 5.4 Network Low Low Required Changed Low Low None 12.2.6-12.2.11

Notes:

  1. Oracle E-Business Suite version is 12.2

Additional CVEs addressed are:

  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle Enterprise Manager Risk Matrix

This Critical Patch Update contains 10 new security patches for Oracle Enterprise Manager. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the April 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2844807.1 .

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Enterprise Manager Base Platform Oracle Management Service (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 13.4.0.0, 13.5.0.0
CVE-2018-1285 Oracle Application Testing Suite Load Testing for Web Apps (Apache log4net) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 13.3.0.1
CVE-2021-40438 Enterprise Manager Ops Center User Interface (Apache HTTP Server) HTTP Yes 9.0 Network High None None Changed High High High 12.4.0.0
CVE-2021-3518 Enterprise Manager Base Platform Enterprise Manager Install (libxml2) HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 13.4.0.0, 13.5.0.0
CVE-2021-2351 Enterprise Manager Ops Center Networking (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.4.0.0
CVE-2021-3450 Enterprise Manager for Storage Management Privilege Management (OpenSSL) HTTPS Yes 7.4 Network High None None Un-

changed
High High None 13.4.0.0
CVE-2021-44832 Enterprise Manager Base Platform Enterprise Manager Install (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 13.4.0.0, 13.5.0.0
CVE-2021-44832 Enterprise Manager for Peoplesoft PSEM Plugin (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 13.4.1.1, 13.5.1.1
CVE-2021-44832 Enterprise Manager Ops Center Networking (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.4.0.0
CVE-2022-21469 Enterprise Manager Base Platform UI Framework HTTP Yes 4.7 Network Low None Required Changed None Low None 13.4.0.0, 13.5.0.0

Additional CVEs addressed are:

  • The patch for CVE-2021-3450 also addresses CVE-2020-1971, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841, and CVE-2021-3449.
  • The patch for CVE-2021-3518 also addresses CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3517, and CVE-2021-3537.
  • The patch for CVE-2021-40438 also addresses CVE-2021-44224, and CVE-2021-44790.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 41 new security patches for Oracle Financial Services Applications. 19 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22965 Oracle Financial Services Analytical Applications Infrastructure Others (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.1.1.0, 8.1.2.0
CVE-2022-22965 Oracle Financial Services Behavior Detection Platform BD (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.1.1.0, 8.1.1.1, 8.1.2.0
CVE-2022-22965 Oracle Financial Services Enterprise Case Management Installers (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.1.1.0, 8.1.1.1, 8.1.2.0
CVE-2022-23305 Oracle Financial Services Revenue Management and Billing Infrastructure (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 2.7.0.0, 2.7.0.1, 2.8.0.0
CVE-2021-2351 Oracle Banking Enterprise Default Management Collections (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 2.10.0, 2.12.0
CVE-2021-2351 Oracle Banking Platform Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 2.6.2, 2.7.1, 2.12.0
CVE-2021-36090 Oracle Banking Payments Infrastructure (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.5
CVE-2021-36090 Oracle Banking Trade Finance Infrastructure (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.5
CVE-2021-37714 Oracle Banking Trade Finance Infrastructure (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.5
CVE-2021-36090 Oracle Banking Treasury Management Infrastructure (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.5
CVE-2021-37714 Oracle Banking Treasury Management Infrastructure (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.5
CVE-2021-36090 Oracle FLEXCUBE Universal Banking Infrastructure (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.4, 14.0-14.3, 14.5
CVE-2021-37714 Oracle FLEXCUBE Universal Banking Infrastructure (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 14.0-14.3, 14.5
CVE-2021-44832 Oracle Banking Deposits and Lines of Credit Servicing Web UI (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 2.12.0
CVE-2021-44832 Oracle Banking Enterprise Default Management Collections (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 2.7.1, 2.12.0
CVE-2021-44832 Oracle Banking Loans Servicing Web UI (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 2.12.0
CVE-2021-44832 Oracle Banking Party Management Web UI (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 2.7.0
CVE-2021-44832 Oracle Banking Payments Infrastructure (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.5
CVE-2021-44832 Oracle Banking Platform SECURITY (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 2.6.2, 2.7.1, 2.12.0
CVE-2021-44832 Oracle Banking Trade Finance Infrastructure (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.5
CVE-2021-44832 Oracle Banking Treasury Management Infrastructure (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.5
CVE-2021-44832 Oracle FLEXCUBE Universal Banking Infrastructure (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 11.83.3, 12.1-12.4, 14.0-14.3, 14.5
CVE-2021-30129 Oracle Banking Payments Infrastructure (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 14.5
CVE-2021-30129 Oracle Banking Trade Finance Infrastructure (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 14.5
CVE-2021-30129 Oracle Banking Treasury Management Infrastructure (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 14.5
CVE-2022-23437 Oracle Financial Services Analytical Applications Infrastructure Others (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 8.0.6.0-8.0.9.0, 8.1.0.0-8.1.2.0
CVE-2022-23437 Oracle Financial Services Behavior Detection Platform Third Party (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 8.0.6.0-8.0.8.0, 8.1.1.0, 8.1.1.1, 8.1.2.0
CVE-2022-23437 Oracle Financial Services Enterprise Case Management Installers (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0, 8.1.1.1
CVE-2021-30129 Oracle FLEXCUBE Universal Banking Infrastructure (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 14.0-14.3, 14.5
CVE-2022-21475 Oracle Banking Payments Infrastructure HTTP No 5.9 Network High Low Required Un-

changed
Low High Low 14.5
CVE-2022-21474 Oracle Banking Trade Finance Infrastructure HTTP No 5.9 Network High Low Required Un-

changed
Low High Low 14.5
CVE-2022-21473 Oracle Banking Treasury Management Infrastructure HTTP No 5.9 Network High Low Required Un-

changed
Low High Low 14.5
CVE-2021-38153 Oracle Financial Services Analytical Applications Infrastructure Others (Apache Kafka) HTTP Yes 5.9 Network High None None Un-

changed
High None None 8.0.6.0-8.0.9.0, 8.1.0.0-8.1.2.0
CVE-2021-38153 Oracle Financial Services Behavior Detection Platform Third Party (Apache Kafka) HTTP Yes 5.9 Network High None None Un-

changed
High None None 8.0.6.0-8.0.8.0, 8.1.1.0, 8.1.1.1, 8.1.2.0
CVE-2021-38153 Oracle Financial Services Enterprise Case Management Installers (Apache Kafka) HTTP Yes 5.9 Network High None None Un-

changed
High None None 8.0.7.1, 8.0.7.2, 8.0.8.0, 8.0.8.1, 8.1.1.0, 8.1.1.1
CVE-2022-21472 Oracle FLEXCUBE Universal Banking Infrastructure HTTP No 5.9 Network High Low Required Un-

changed
Low High Low 12.4, 14.0-14.3, 14.5
CVE-2021-36374 Oracle Banking Trade Finance Infrastructure (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 14.5
CVE-2021-31812 Oracle Banking Trade Finance Infrastructure (Apache PDFBox) None No 5.5 Local Low None Required Un-

changed
None None High 14.5
CVE-2021-36374 Oracle Banking Treasury Management Infrastructure (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 14.5
CVE-2021-31812 Oracle Banking Treasury Management Infrastructure (Apache PDFBox) None No 5.5 Local Low None Required Un-

changed
None None High 14.5
CVE-2021-31812 Oracle FLEXCUBE Universal Banking Infrastructure (Apache PDFBox) None No 5.5 Local Low None Required Un-

changed
None None High 14.0-14.3, 14.5

Additional CVEs addressed are:

  • The patch for CVE-2021-31812 also addresses CVE-2021-27807, CVE-2021-27906, and CVE-2021-31811.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2021-38153 also addresses CVE-2021-26291.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle Fusion Middleware Risk Matrix

This Critical Patch Update contains 54 new security patches plus additional third party patches noted below for Oracle Fusion Middleware. 41 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update April 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update April 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2853458.2.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle Business Intelligence Enterprise Edition Analytics Server (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 5.9.0.0.0
CVE-2022-23305 Oracle Business Intelligence Enterprise Edition BI Platform Security (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2022-23305 Oracle Business Intelligence Enterprise Edition Storage Service Integration (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.4.0
CVE-2022-23305 Oracle Business Process Management Suite Runtime Engine (JBoss Enterprise Application Platform) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21420 Oracle Coherence Core T3 Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-39275 Oracle HTTP Server Web Listener (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-23305 Oracle Identity Management Suite Installer (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-23305 Oracle Identity Manager Connector General and Misc (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High See Note 1
CVE-2022-21445 Oracle JDeveloper ADF Faces HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-23305 Oracle JDeveloper Oracle JDeveloper (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0
CVE-2022-23305 Oracle Middleware Common Libraries and Tools Third Party Patch (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.4.0
CVE-2022-23305 Oracle Tuxedo Third Party Patch (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.2.0.0
CVE-2022-23305 Oracle WebLogic Server Centralized Third Party Jars (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21404 Helidon Reactive WebServer HTTP Yes 8.1 Network High None None Un-

changed
High High High 1.4.10, 2.0.0-RC1
CVE-2021-22901 Oracle HTTP Server SSL Module (cURL) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21497 Oracle Web Services Manager Web Services Security HTTP Yes 8.1 Network Low None Required Un-

changed
High High None 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21421 Oracle Business Intelligence Enterprise Edition Analytics Web General HTTP Yes 7.5 Network Low None None Un-

changed
High None None 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2021-37714 Oracle Business Process Management Suite Installer (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2019-0227 Oracle Internet Directory Oracle Directory Services Mngr (Apache Axis) HTTP Yes 7.5 Adjacent

Network
High None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0 See Note 2
CVE-2021-40690 Oracle Outside In Technology Installation (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.5.5, 8.5.6 See Note 3
CVE-2021-36090 Oracle WebCenter Portal Security Framework (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-37137 Oracle WebCenter Portal Security Framework (Netty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2020-25649 Oracle WebCenter Portal Security Framework (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-37714 Oracle WebCenter Portal Security Framework (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2020-7226 Oracle WebCenter Sites WebCenter Sites (Cryptacular) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21441 Oracle WebLogic Server Core T3/IIOP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-44832 Oracle Data Integrator Runtime Java agent for ODI (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-44832 Oracle Identity Management Suite Installer (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-44832 Oracle Identity Manager Connector General and Misc (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 9.1.0
CVE-2021-44832 Oracle JDeveloper Oracle JDeveloper (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.4.0
CVE-2021-44832 Oracle Managed File Transfer MFT Runtime Server (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-44832 Oracle WebCenter Portal Security Framework (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-44832 Oracle WebCenter Sites Advanced UI (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-43797 Helidon Reactive WebServer (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 1.4.10,2.4.0
CVE-2021-30129 Middleware Common Libraries and Tools FMW Remote Diagnostic Agent (Apache MINA SSHD and Apache MINA) HTTP No 6.5 Network Low Low None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-43797 Oracle Coherence Configuration and Parsing (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 12.2.1.4.0, 14.1.1.0.0
CVE-2020-24977 Oracle HTTP Server SSL Module (libxml2) HTTPS Yes 6.5 Network Low None None Un-

changed
Low None Low 12.2.1.3.0, 12.2.1.4.0
CVE-2021-44224 Oracle HTTP Server SSL Module (Apache HTTP Server) HTTPS Yes 6.5 Network Low None None Un-

changed
None Low Low 12.2.1.3.0, 12.2.1.4.0
CVE-2022-23437 Oracle WebLogic Server Third Party Tools (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21492 Oracle Business Intelligence Enterprise Edition Analytics Server HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.9.0.0.0
CVE-2022-21419 Oracle Business Intelligence Enterprise Edition Visual Analyzer HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.5.0.0.0, 5.9.0.0.0
CVE-2022-21448 Oracle Business Intelligence Enterprise Edition Visual Analyzer HTTP Yes 6.1 Network Low None Required Changed Low Low None 5.9.0.0.0
CVE-2022-21453 Oracle WebLogic Server Console HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-41184 Oracle WebLogic Server Console, Samples (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2020-17521 Oracle Business Process Management Suite BPM Studio (Apache Groovy) None No 5.5 Local Low Low None Un-

changed
High None None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-31812 Oracle WebCenter Portal Security Framework (Apache PDFbox) None No 5.5 Local Low None Required Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-28657 Oracle WebCenter Portal Security Framework (Apache Tika) None No 5.5 Local Low None Required Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-41165 Oracle WebCenter Portal Security Framework (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 12.2.1.3.0, 12.2.1.4.0
CVE-2018-11212 Oracle Internet Directory Oracle Directory Services Manager (libjpeg) HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 12.2.1.3.0, 12.2.1.4.0
CVE-2021-33037 Oracle Managed File Transfer MFT Runtime Server (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.2.1.3.0, 12.2.1.4.0
CVE-2021-28170 Oracle WebLogic Server Centralized Third Party Jars (JBoss Enterprise Application Platform) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 14.1.1.0.0
CVE-2021-29425 Helidon CDI support (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 1.4.7, 2.2.0
CVE-2021-29425 Oracle WebCenter Portal Security Framework (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.2.1.3.0, 12.2.1.4.0
CVE-2020-8908 Oracle WebLogic Server Third Party Tools (Guava) None No 3.3 Local Low Low None Un-

changed
Low None None 14.1.1.0.0

Notes:

  1. The supported versions of Oracle Identity Manager Connector are not impacted by CVE-2022-23305, CVE-2022-23302, CVE-2022-23307, and CVE-2021-4104.
  2. The patch for CVE-2019-0227 also addresses CVE-2018-2601 for Oracle Internet Directory 12.2.1.4.0.
  3. Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS Base Score depend on the software that uses Outside In Technology. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology, but if data is not received over a network the CVSS score may be lower.

Additional CVEs addressed are:

  • The patch for CVE-2019-0227 also addresses CVE-2018-8032.
  • The patch for CVE-2020-24977 also addresses CVE-2021-22901, CVE-2021-39275, and CVE-2021-44224.
  • The patch for CVE-2020-25649 also addresses CVE-2020-35490, CVE-2020-35491, CVE-2020-35728, CVE-2020-36179, CVE-2020-36180, CVE-2020-36181, CVE-2020-36182, CVE-2020-36183, CVE-2020-36184, CVE-2020-36185, CVE-2020-36186, CVE-2020-36187, CVE-2020-36188, and CVE-2020-36189.
  • The patch for CVE-2021-28170 also addresses CVE-2020-10693.
  • The patch for CVE-2021-30129 also addresses CVE-2021-41973.
  • The patch for CVE-2021-31812 also addresses CVE-2021-31811.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2021-37137 also addresses CVE-2021-37136.
  • The patch for CVE-2021-41165 also addresses CVE-2021-41164.
  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2021-43797 also addresses CVE-2021-21409, CVE-2021-37136, and CVE-2021-37137.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle WebCenter Sites
    • WebCenter Sites (Bouncy Castle Java Library): CVE-2020-28052.

Oracle Health Sciences Applications Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Health Sciences Applications. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3711 Oracle Health Sciences InForm Publisher Connector (OpenSSL) TLS Yes 9.8 Network Low None None Un-

changed
High High High 6.2.1.0, 6.3.1.1
CVE-2021-44832 Oracle Health Sciences Empirica Signal Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 9.1.0.6, 9.2.0.0
CVE-2021-44832 Oracle Health Sciences InForm Cognos logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 6.2.1.1, 6.3.2.1, 7.0.0.0

Additional CVEs addressed are:

  • The patch for CVE-2021-3711 also addresses CVE-2021-3712, and CVE-2021-4160.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Oracle HealthCare Applications Risk Matrix

This Critical Patch Update contains 10 new security patches for Oracle HealthCare Applications. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle Healthcare Data Repository FHIR (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.1.0
CVE-2021-36090 Oracle Healthcare Data Repository FHIR Commandline (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.1.0
CVE-2021-44832 Oracle Health Sciences Information Manager Record Locator (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 3.0.1-3.0.4
CVE-2021-44832 Oracle Healthcare Data Repository FHIR (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 8.1.1
CVE-2021-44832 Oracle Healthcare Foundation RPD Generation (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 7.3.0.1-7.3.0.4
CVE-2021-44832 Oracle Healthcare Master Person Index IHE (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 5.0.1
CVE-2021-44832 Oracle Healthcare Translational Research Datastudio (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 4.1.1
CVE-2021-33037 Oracle Healthcare Translational Research Datastudio (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 4.1.0
CVE-2021-29425 Oracle Health Sciences Information Manager Health Policy Engine (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 3.0.1-3.0.4
CVE-2021-29425 Oracle Healthcare Data Repository FHIR Comandline (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 8.1.0

Additional CVEs addressed are:

  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle Hospitality Applications Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle Hospitality Applications. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-13936 Oracle Hospitality Token Proxy Service TPS Service (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 19.2
CVE-2021-37714 Oracle Hospitality Token Proxy Service TPS Service (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 19.2
CVE-2021-44832 Oracle Hospitality Suite8 Leisure (Apache Log4j) TCP No 6.6 Network High High None Un-

changed
High High High 8.13.0, 8.14.0
CVE-2021-44832 Oracle Hospitality Token Proxy Service TPS Service (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 19.2
CVE-2021-44832 Oracle Payment Interface OPI Core (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 19.1, 20.3
CVE-2021-41184 Oracle Hospitality Suite8 WebConnect (jQueryUI) HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.10.2, 8.11.0-8.14.0

Additional CVEs addressed are:

  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Oracle Hyperion Risk Matrix

This Critical Patch Update contains 12 new security patches for Oracle Hyperion. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle Hyperion Data Relationship Management Installation/Configuration (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 11.2.8.0
CVE-2022-23305 Oracle Hyperion Infrastructure Technology Installation and Configuration (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion BI+ Architect (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion Data Relationship Management Installation/Configuration (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion Financial Management Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion Infrastructure Technology Installation and Configuration (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion Planning Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion Profitability and Cost Management Install (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2021-44832 Oracle Hyperion Tax Provision Tax Provision (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 11.2.8.0
CVE-2020-6950 Oracle Hyperion Calculation Manager General (Eclipse Mojarra) HTTP Yes 6.5 Network Low None Required Un-

changed
High None None Prior to 11.2.8.0
CVE-2021-31812 Oracle Hyperion Infrastructure Technology Installation and Configuration (Apache PDFbox) None No 5.5 Local Low None Required Un-

changed
None None High Prior to 11.2.8.0
CVE-2020-7760 Oracle Hyperion Data Relationship Management Web Client – Unicode (CodeMirror) HTTP Yes 5.3 Network Low None None Un-

changed
None None Low Prior to 11.2.9.0

Additional CVEs addressed are:

  • The patch for CVE-2021-31812 also addresses CVE-2021-31811.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle iLearning Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle iLearning. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23437 Oracle iLearning Installation (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 6.2, 6.3

Oracle Insurance Applications Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Insurance Applications. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Documaker Development Tools (JDBC, OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.6.0, 12.6.2-12.6.4, 12.7.0
CVE-2021-36090 Oracle Insurance Policy Administration Architecture (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1
CVE-2021-44832 Oracle Insurance Data Gateway Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 1.0.1
CVE-2021-44832 Oracle Insurance Insbridge Rating and Underwriting Framework Administrator IBFA (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 5.2.0, 5.4.0-5.6.0, 5.6.1
CVE-2021-35043 Oracle Insurance Policy Administration Architecture (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1
CVE-2021-29425 Oracle Insurance Policy Administration Architecture (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1
CVE-2021-29425 Oracle Insurance Rules Palette Architecture (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 11.0.2, 11.1.0, 11.2.8, 11.3.0, 11.3.1

Additional CVEs addressed are:

  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.

Oracle Java SE Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-0778 Oracle GraalVM Enterprise Edition Node (OpenSSL) HTTPS Yes 7.5 Network Low None None Un-

changed
None None High Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1, 22.0.0.2
CVE-2022-21449 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 7.5 Network Low None None Un-

changed
None High None Oracle Java SE: 17.0.2, 18; Oracle GraalVM Enterprise Edition: 21.3.1, 22.0.0.2
CVE-2022-21476 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 7.5 Network Low None None Un-

changed
High None None Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1, 22.0.0.2 See Note 1
CVE-2022-21426 Oracle Java SE, Oracle GraalVM Enterprise Edition JAXP Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1, 22.0.0.2 See Note 1
CVE-2022-21496 Oracle Java SE, Oracle GraalVM Enterprise Edition JNDI Multiple Yes 5.3 Network Low None None Un-

changed
None Low None Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1, 22.0.0.2 See Note 1
CVE-2022-21434 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None Low None Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1, 22.0.0.2 See Note 1
CVE-2022-21443 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 3.7 Network High None None Un-

changed
None None Low Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1, 22.0.0.2 See Note 1

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

Additional CVEs addressed are:

  • The patch for CVE-2022-0778 also addresses CVE-2021-44531, CVE-2021-44532, CVE-2021-44533, and CVE-2022-21824.

Oracle JD Edwards Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle JD Edwards. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-42013 JD Edwards EnterpriseOne Tools Upgrade SEC (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 9.2.6.0
CVE-2021-3711 JD Edwards EnterpriseOne Tools Enterprise Infrastructure (OpenSSL) JDENET Yes 9.8 Network Low None None Un-

changed
High High High Prior to 9.2.6.3
CVE-2021-3711 JD Edwards World Security World Software Security (OpenSSL) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High A9.4
CVE-2021-2351 JD Edwards EnterpriseOne Tools Database and Comm SEC (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 9.2.6.3
CVE-2021-2351 JD Edwards EnterpriseOne Tools Monitoring and Diagnostics SEC (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 9.2.6.3
CVE-2022-21464 JD Edwards EnterpriseOne Tools Business Logic Infra SEC HTTP Yes 8.2 Network Low None None Un-

changed
Low None High Prior to 9.2.6.3
CVE-2021-32066 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech-Cloud (Ruby) HTTP Yes 7.4 Network High None None Un-

changed
High High None Prior to 9.2.6.1
CVE-2022-21409 JD Edwards EnterpriseOne Tools Web Runtime HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 9.2.6.3

Additional CVEs addressed are:

  • The patch for CVE-2021-32066 also addresses CVE-2021-31799, and CVE-2021-31810.
  • The patch for CVE-2021-3711 also addresses CVE-2021-3712.

Oracle MySQL Risk Matrix

This Critical Patch Update contains 43 new security patches for Oracle MySQL. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 MySQL Enterprise Monitor Monitoring: General (Apache Log4j) Multiple Yes 9.8 Network Low None None Un-

changed
High High High 8.0.29 and prior
CVE-2022-22965 MySQL Enterprise Monitor Monitoring: General (Spring Framework) Multiple Yes 9.8 Network Low None None Un-

changed
High High High 8.0.29 and prior See Note 1
CVE-2022-0778 MySQL Connectors Connector/C++ (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 8.0.28 and prior
CVE-2022-0778 MySQL Connectors Connector/ODBC (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 8.0.28 and prior
CVE-2021-42340 MySQL Enterprise Monitor Monitoring: General (Apache Tomcat) Multiple Yes 7.5 Network Low None None Un-

changed
None None High 8.0.29 and prior
CVE-2022-0778 MySQL Enterprise Monitor Monitoring: General (OpenSSL) Multiple Yes 7.5 Network Low None None Un-

changed
None None High 8.0.29 and prior
CVE-2021-22570 MySQL Server Server: Compiling (protobuf) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 8.0.28 and prior
CVE-2022-0778 MySQL Server Server: Packaging (OpenSSL) MySQL Protocol Yes 7.5 Network Low None None Un-

changed
None None High 5.7.37 and prior, 8.0.28 and prior
CVE-2022-0778 MySQL Workbench Workbench: libssh (OpenSSL) MySQL Workbench Yes 7.5 Network Low None None Un-

changed
None None High 8.0.28 and prior
CVE-2022-23181 MySQL Enterprise Monitor Monitoring: General (Apache Tomcat) Multiple No 7.0 Local High Low None Un-

changed
High High High 8.0.29 and prior
CVE-2021-44832 MySQL Enterprise Monitor Monitoring: General (Apache Log4j) Multiple No 6.6 Network High High None Un-

changed
High High High 8.0.29 and prior
CVE-2022-21454 MySQL Server Server: Group Replication Plugin MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 5.7.37 and prior, 8.0.28 and prior
CVE-2022-21482 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 8.0.28 and prior
CVE-2022-21483 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior
CVE-2022-21489 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior
CVE-2022-21490 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior
CVE-2021-41184 MySQL Enterprise Monitor Monitoring: General (jQueryUI) Multiple Yes 6.1 Network Low None Required Changed Low Low None 8.0.29 and prior
CVE-2022-21457 MySQL Server Server: PAM Auth Plugin FIDO protocols Yes 5.9 Network High None None Un-

changed
High None None 8.0.28 and prior
CVE-2022-21425 MySQL Server Server: DDL MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.28 and prior
CVE-2022-21440 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.28 and prior
CVE-2022-21459 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.28 and prior
CVE-2022-21478 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.28 and prior
CVE-2022-21479 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
Low None High 8.0.28 and prior
CVE-2022-21418 MySQL Server InnoDB MySQL Protocol No 5.0 Network High High None Un-

changed
None Low High 8.0.28 and prior
CVE-2022-21417 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.37 and prior, 8.0.28 and prior
CVE-2022-21413 MySQL Server Server: DML MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21427 MySQL Server Server: FTS MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.37 and prior, 8.0.28 and prior
CVE-2022-21412 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21414 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21435 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21436 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21437 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21438 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21452 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21462 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21415 MySQL Server Server: Replication MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.28 and prior
CVE-2022-21451 MySQL Server InnoDB MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 5.7.37 and prior, 8.0.28 and prior
CVE-2022-21444 MySQL Server Server: DDL MySQL Protocol No 4.4 Network High High None Un-

changed
None None High 5.7.37 and prior, 8.0.28 and prior
CVE-2022-21460 MySQL Server Server: Logging MySQL Protocol No 4.4 Network High High None Un-

changed
High None None 5.7.37 and prior, 8.0.28 and prior
CVE-2022-21484 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior
CVE-2022-21485 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior
CVE-2022-21486 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior
CVE-2022-21423 MySQL Server InnoDB MySQL Protocol No 2.7 Network Low High None Un-

changed
None None Low 8.0.28 and prior

Notes:

  1. The patch for CVE-2022-22965 also addresses CVE-2022-22968.

Additional CVEs addressed are:

  • The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
  • The patch for CVE-2022-23305 also addresses CVE-2019-17571, CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle PeopleSoft Risk Matrix

This Critical Patch Update contains 14 new security patches for Oracle PeopleSoft. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3518 PeopleSoft Enterprise PeopleTools PeopleSoft CDA (libxml2) HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 8.58
CVE-2021-37714 PeopleSoft Enterprise PeopleTools Elastic Search (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.58, 8.59
CVE-2021-40690 PeopleSoft Enterprise PeopleTools Security (Apache Santuario XML Security for Java) HTTPS Yes 7.5 Network Low None None Un-

changed
High None None 8.58, 8.59
CVE-2021-44832 PeopleSoft Enterprise PeopleTools Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 8.58, 8.59
CVE-2022-21447 PeopleSoft Enterprise CS Academic Advisement Advising Notes HTTP No 6.5 Network Low Low None Un-

changed
High None None 9.2
CVE-2021-43797 PeopleSoft Enterprise PeopleTools Elastic Search (Netty) HTTP Yes 6.5 Network Low None Required Un-

changed
None High None 8.58, 8.59
CVE-2022-21458 PeopleSoft Enterprise PeopleTools Navigation Pages, Portal, Query HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.58, 8.59
CVE-2022-21470 PeopleSoft Enterprise PeopleTools Process Scheduler HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.58, 8.59
CVE-2021-4160 PeopleSoft Enterprise PeopleTools Security (OpenSSL) TLS Yes 5.9 Network High None None Un-

changed
High None None 8.58, 8.59
CVE-2022-21481 PeopleSoft Enterprise FIN Cash Management Financial Gateway HTTP No 5.4 Network Low Low Required Changed Low Low None 9.2
CVE-2021-41165 PeopleSoft Enterprise PeopleTools Rich Text Editor (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 8.58, 8.59
CVE-2022-21450 PeopleSoft Enterprise PRTL Interaction Hub My Links HTTP No 5.4 Network Low Low Required Changed Low Low None 9.1
CVE-2021-44533 PeopleSoft Enterprise PeopleTools Elastic Search (Node.js) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 8.58, 8.59
CVE-2020-8908 PeopleSoft Enterprise PeopleTools File Processing (Guava) None No 3.3 Local Low Low None Un-

changed
Low None None 8.58, 8.59

Additional CVEs addressed are:

  • The patch for CVE-2021-3518 also addresses CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3517, and CVE-2021-3537.
  • The patch for CVE-2021-41165 also addresses CVE-2021-41164.
  • The patch for CVE-2021-44533 also addresses CVE-2021-44531, CVE-2021-44532, and CVE-2022-21824.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Oracle Retail Applications Risk Matrix

This Critical Patch Update contains 30 new security patches for Oracle Retail Applications. 15 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-22965 Oracle Retail Xstore Point of Service Xenvironment (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 20.0.1, 21.0.0
CVE-2020-13936 Oracle Retail Xstore Office Cloud Service Configurator (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1
CVE-2021-39139 Oracle Retail Xstore Point of Service Xenvironment (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1
CVE-2021-40690 Oracle Retail Bulk Data Integration BDI Job Scheduler (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 16.0.3
CVE-2021-37714 Oracle Retail Customer Management and Segmentation Foundation Segment (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 17.0-19.0
CVE-2021-40690 Oracle Retail Financial Integration PeopleSoft Integration Bugs (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-40690 Oracle Retail Integration Bus RIB Kernal (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-40690 Oracle Retail Merchandising System Foundation (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 16.0.3, 19.0.1
CVE-2021-40690 Oracle Retail Service Backbone RSB Installation (Apache Santuario XML Security For Java) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2019-10086 Oracle Retail Invoice Matching Security (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 16.0.3
CVE-2021-44832 Oracle Retail Customer Insights Other (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 15.0.2, 16.0.2
CVE-2021-44832 Oracle Retail Data Extractor for Merchandising Installer (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 15.0.2, 16.0.2
CVE-2021-44832 Oracle Retail EFTLink Installation (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 17.0.2, 18.0.1, 19.0.1, 20.0.1, 21.0.0
CVE-2021-44832 Oracle Retail Financial Integration PeopleSoft Integration Bugs (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1
CVE-2021-44832 Oracle Retail Integration Bus RIB Kernal (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1
CVE-2021-44832 Oracle Retail Merchandising System Foundation (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 16.0.3, 19.0.1
CVE-2021-44832 Oracle Retail Service Backbone RSB Installation (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1
CVE-2021-44832 Oracle Retail Store Inventory Management SIM Integration (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.0.4.13, 14.1.3.14, 14.1.3.5, 15.0.3.3, 15.0.3.8, 16.0.3.7
CVE-2022-23437 Oracle Retail Bulk Data Integration BDI Job Scheduler (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 16.0.3
CVE-2021-30129 Oracle Retail Customer Management and Segmentation Foundation Segment (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 18.0, 19.0
CVE-2022-23437 Oracle Retail Extract Transform and Load Mathematical Operators (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 13.2.8
CVE-2022-23437 Oracle Retail Financial Integration PeopleSoft Integration Bugs (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2022-23437 Oracle Retail Integration Bus RIB Kernal (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2022-23437 Oracle Retail Merchandising System Foundation (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 16.0.3, 19.0.1
CVE-2022-23437 Oracle Retail Service Backbone RSB Installation (Apache Xerces-J) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-36374 Oracle Retail EFTLink Installation (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 19.0.1, 20.0.1
CVE-2021-36374 Oracle Retail Invoice Matching Security (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 16.0.3
CVE-2021-36374 Oracle Retail Xstore Point of Service Xenvironment (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1
CVE-2021-31812 Oracle Retail Xstore Point of Service Xstore Office (Apache PDFbox) None No 5.5 Local Low None Required Un-

changed
None None High 16.0.6, 17.0.4, 18.0.3, 19.0.2, 20.0.1
CVE-2021-34429 Oracle Retail EFTLink Framework (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 20.0.1

Additional CVEs addressed are:

  • The patch for CVE-2021-31812 also addresses CVE-2021-27807, CVE-2021-27906, and CVE-2021-31811.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2021-39139 also addresses CVE-2021-29505, CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153, and CVE-2021-39154.

Oracle Supply Chain Risk Matrix

This Critical Patch Update contains 11 new security patches for Oracle Supply Chain. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-23305 Oracle Advanced Supply Chain Planning MscObieeSrvlt (Apache Log4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.1, 12.2
CVE-2022-22965 Oracle Product Lifecycle Analytics Installer (Spring Framework) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 3.6.1.0
CVE-2021-42340 Oracle Agile PLM Security (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 9.3.6
CVE-2021-44832 Oracle Agile Engineering Data Management Installation Issues (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 6.2.1.0
CVE-2021-44832 Oracle Agile PLM Security (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 9.3.6
CVE-2021-44832 Oracle Agile PLM MCAD Connector CAX Client (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 3.6
CVE-2021-44832 Oracle Autovue for Agile Product Lifecycle Management Internal Operations (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 21.0.2
CVE-2022-21467 Oracle Agile PLM Attachments HTTP No 6.5 Network Low Low None Un-

changed
High None None 9.3.6
CVE-2022-21480 Oracle Transportation Management User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 6.4.3, 6.5.1
CVE-2021-41165 Oracle Agile PLM Security (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 9.3.6
CVE-2021-29425 Oracle Agile PLM Security (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 9.3.6

Additional CVEs addressed are:

  • The patch for CVE-2021-41165 also addresses CVE-2021-41164.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.
  • The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.

Oracle Support Tools Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Support Tools. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-30129 OSS Support Tools Diagnostic Assistant (Apache MINA SSHD) HTTP No 6.5 Network Low Low None Un-

changed
None None High 2.12.42
CVE-2021-41973 OSS Support Tools Diagnostic Assistant (Apache MINA) HTTP Yes 6.5 Network Low None Required Un-

changed
None None High 2.12.42
CVE-2022-21405 OSS Support Tools Oracle Explorer None No 5.5 Local Low High Required Changed High None None 18.3

Oracle Systems Risk Matrix

This Critical Patch Update contains 20 new security patches for Oracle Systems. 14 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2019-17195 Oracle Solaris Cluster Tools (Nimbus JOSE+JWT) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 4
CVE-2021-39275 Oracle ZFS Storage Appliance Kit Operating System Image Multiple Yes 9.8 Network Low None None Un-

changed
High High High 8.8
CVE-2021-2351 Oracle StorageTek ACSLS Software (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.5.1
CVE-2021-2351 Oracle StorageTek Tape Analytics (STA) Application Server (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 2.4
CVE-2022-21446 Oracle Solaris Utility Multiple Yes 8.2 Network Low None None Un-

changed
Low High None 11
CVE-2020-11979 Oracle StorageTek ACSLS Software (Apache Ant) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 8.5.1
CVE-2020-11979 Oracle StorageTek Tape Analytics (STA) Core (Apache Ant) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 2.4
CVE-2020-6950 Oracle Solaris Cluster Tools (Eclipse Mojarra) HTTP Yes 6.5 Network Low None Required Un-

changed
High None None 4
CVE-2020-5421 Oracle StorageTek ACSLS Software (Spring Framework) HTTP No 6.5 Network High Low Required Changed Low High None 8.5.1
CVE-2019-3740 Oracle StorageTek ACSLS Software (RSA BSAFE Crypto-J) HTTPS Yes 6.5 Network Low None Required Un-

changed
High None None 8.5.1
CVE-2020-11022 Oracle StorageTek ACSLS Software (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.5.1
CVE-2022-21493 Oracle Solaris Kernel None No 5.9 Local Low Low Required Changed None None High 11
CVE-2022-21461 Oracle Solaris Kernel None No 5.5 Local Low Low None Un-

changed
High None None 11
CVE-2022-21463 Oracle Solaris Kernel None No 5.5 Local Low Low None Un-

changed
None None High 11
CVE-2022-21416 Oracle Solaris Utility None No 5.0 Local Low Low Required Un-

changed
None High None 11
CVE-2021-29425 Oracle Solaris Cluster Tools (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 4
CVE-2022-21494 Oracle Solaris Kernel None No 4.0 Local High High Required Un-

changed
None None High 11
CVE-2020-1968 Oracle Ethernet Switch ES1-24 Firmware (OpenSSL) HTTPS Yes 3.7 Network High None None Un-

changed
Low None None 1.3.1
CVE-2020-1968 Oracle Ethernet Switch TOR-72 Firmware (OpenSSL) HTTPS Yes 3.7 Network High None None Un-

changed
Low None None 1.2.2
CVE-2020-9488 Oracle StorageTek ACSLS Software (Apache Log4j) HTTP Yes 3.7 Network High None None Un-

changed
Low None None 8.5.1

Additional CVEs addressed are:

  • The patch for CVE-2019-3740 also addresses CVE-2019-3738, and CVE-2019-3739.
  • The patch for CVE-2020-11022 also addresses CVE-2020-11023.
  • The patch for CVE-2021-39275 also addresses CVE-2019-13038, CVE-2019-14822, CVE-2021-25219, CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-4034, CVE-2021-40438, CVE-2021-41617, CVE-2021-4181, CVE-2021-4182, CVE-2021-4183, CVE-2021-4184, CVE-2021-4185, CVE-2021-42717, CVE-2021-43395, CVE-2021-43818, CVE-2021-44224, CVE-2021-44790, CVE-2022-0391, CVE-2022-0778, CVE-2022-21271, CVE-2022-21375, CVE-2022-21384, CVE-2022-21446, CVE-2022-21461, CVE-2022-21463, CVE-2022-21493, CVE-2022-21494, CVE-2022-21716, CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, CVE-2022-25314, and CVE-2022-25315.

Oracle Taleo Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Taleo. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-44832 Oracle Taleo Platform Taleo Connect Client Installer (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High Prior to 22.1

Oracle Utilities Applications Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Utilities Applications. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-44832 Oracle Utilities Framework General (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0

Oracle Virtualization Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-40438 Oracle Secure Global Desktop Web Server (Apache HTTP Server) HTTP Yes 9.0 Network High None None Changed High High High 5.6
CVE-2022-21491 Oracle VM VirtualBox Core None No 7.8 Local Low Low None Un-

changed
High High High Prior to 6.1.34 See Note 1
CVE-2022-21465 Oracle VM VirtualBox Core None No 6.7 Local Low High None Changed None Low High Prior to 6.1.34
CVE-2022-21471 Oracle VM VirtualBox Core None No 6.5 Local Low Low None Changed None None High Prior to 6.1.34
CVE-2022-21487 Oracle VM VirtualBox Core None No 3.8 Local Low Low None Changed Low None None Prior to 6.1.34
CVE-2022-21488 Oracle VM VirtualBox Core None No 3.8 Local Low Low None Changed None Low None Prior to 6.1.34

Notes:

  1. This vulnerability applies to Windows systems only.

Related:

  • No Related Posts

Oracle Critical Patch Update Advisory – January 2022

Oracle Critical Patch Update Advisory – January 2022

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 497 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at January 2022 Critical Patch Update: Executive Summary and Analysis.

Please note that on December 10, 2021, Oracle released a Security Alert for Apache Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers should review the Alert if they have not already done so.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Agile Product Lifecycle Management Integration Pack for Oracle E-Business Suite, version 3.6 Oracle Supply Chain Products
Application Performance Management, versions 13.4.1.0, 13.5.1.0 Enterprise Manager
Big Data Spatial and Graph, versions prior to 23.1 Database
Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 Enterprise Manager
Enterprise Manager Ops Center, version 12.4.0.0 Enterprise Manager
Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers, versions prior to XCP2410, prior to XCP3110 Systems
Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3 Oracle Construction and Engineering Suite
JD Edwards EnterpriseOne Tools, versions prior to 9.2.6.1 JD Edwards
MySQL Cluster, versions 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior MySQL
MySQL Connectors, versions 8.0.27 and prior MySQL
MySQL Server, versions 5.7.36 and prior, 8.0.27 and prior MySQL
MySQL Workbench, versions 8.0.27 and prior MySQL
Oracle Access Manager, versions 11.1.2.3.0, 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Agile Engineering Data Management, version 6.2.1.0 Oracle Supply Chain Products
Oracle Agile PLM, versions 9.3.3, 9.3.6 Oracle Supply Chain Products
Oracle Agile PLM MCAD Connector, versions 3.4, 3.6 Oracle Supply Chain Products
Oracle Airlines Data Model, versions 12.1.1.0.0, 12.2.0.1.0 Oracle Airlines Data Model
Oracle Application Express, versions prior to 21.1.4 Database
Oracle Application Testing Suite, version 13.3.0.1 Enterprise Manager
Oracle Argus Analytics, versions 8.2.1, 8.2.2, 8.2.3 Health Sciences
Oracle Argus Insight, versions 8.2.1, 8.2.2, 8.2.3 Health Sciences
Oracle Argus Mart, versions 8.2.1, 8.2.2, 8.2.3 Health Sciences
Oracle Argus Safety, versions 8.2.1, 8.2.2, 8.2.3 Health Sciences
Oracle Banking APIs, versions 18.1-18.3, 19.1, 19.2, 20.1, 21.1 Contact Support
Oracle Banking Deposits and Lines of Credit Servicing, version 2.12.0 Contact Support
Oracle Banking Digital Experience, versions 17.2, 18.1-18.3, 19.1, 19.2, 20.1, 21.1 Contact Support
Oracle Banking Enterprise Default Management, versions 2.3.0-2.4.1, 2.6.2, 2.7.0, 2.7.1, 2.10.0, 2.12.0 Oracle Banking Platform
Oracle Banking Loans Servicing, version 2.12.0 Contact Support
Oracle Banking Party Management, version 2.7.0 Oracle Banking Platform
Oracle Banking Platform, versions 2.3.0-2.4.1, 2.6.2, 2.7.0, 2.7.1 Oracle Banking Platform
Oracle BI Publisher, versions 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Business Activity Monitoring, version 12.2.1.4.0 Fusion Middleware
Oracle Business Intelligence Enterprise Edition, versions 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Business Process Management Suite, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Clinical, versions 5.2.1, 5.2.2 Health Sciences
Oracle Commerce Guided Search, version 11.3.2 Oracle Commerce
Oracle Commerce Platform, versions 11.3.0, 11.3.1, 11.3.2 Oracle Commerce
Oracle Communications Billing and Revenue Management, versions 12.0.0.3, 12.0.0.4 Oracle Communications Billing and Revenue Management
Oracle Communications BRM – Elastic Charging Engine, versions 11.3, 12.0 Oracle Communications BRM – Elastic Charging Engine
Oracle Communications Calendar Server, version 8.0.0.5.0 Oracle Communications Calendar Server
Oracle Communications Cloud Native Core Automated Test Suite, version 1.8.0 Oracle Communications Cloud Native Core Automated Test Suite
Oracle Communications Cloud Native Core Binding Support Function, versions 1.9.0, 1.10.0 Oracle Communications Cloud Native Core Binding Support Function
Oracle Communications Cloud Native Core Console, version 1.7.0 Communications Cloud Native Core Console
Oracle Communications Cloud Native Core Network Function Cloud Native Environment, version 1.9.0 Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Oracle Communications Cloud Native Core Network Repository Function, version 1.14.0 Oracle Communications Cloud Native Core Network Repository Function
Oracle Communications Cloud Native Core Policy, version 1.14.0 Communications Cloud Native Core Policy
Oracle Communications Cloud Native Core Security Edge Protection Proxy, versions 1.5.0, 1.6.0, 1.15.0 Communications Cloud Native Core Security Edge Protection Proxy
Oracle Communications Cloud Native Core Service Communication Proxy, version 1.14.0 Communications Cloud Native Core Service Communication Proxy
Oracle Communications Cloud Native Core Unified Data Repository, version 1.14.0 Communications Cloud Native Core Unified Data Repository
Oracle Communications Contacts Server, version 8.0.0.3.0 Oracle Communications Contacts Server
Oracle Communications Convergence, version 3.0.2.2.0 Oracle Communications Convergence
Oracle Communications Convergent Charging Controller, versions 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0 Oracle Communications Convergent Charging Controller
Oracle Communications Data Model, versions 11.3.2.1.0, 11.3.2.2.0, 11.3.2.3.0, 12.1.0.1.0, 12.1.2.0.0 Oracle Communications Data Model
Oracle Communications Design Studio, versions 7.3.4, 7.3.5, 7.4.0, 7.4.1, 7.4.2 Oracle Communications Design Studio
Oracle Communications Diameter Signaling Router, versions 8.0.0.0-8.5.1.0 Oracle Communications Diameter Signaling Router
Oracle Communications EAGLE Application Processor, versions 16.1-16.4 Oracle Communications EAGLE Application Processor
Oracle Communications Instant Messaging Server, version 10.0.1.5.0 Oracle Communications Instant Messaging Server
Oracle Communications Interactive Session Recorder, versions 6.3, 6.4 Oracle Communications Interactive Session Recorder
Oracle Communications Messaging Server, version 8.1 Oracle Communications Messaging Server
Oracle Communications Network Charging and Control, versions 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0 Oracle Communications Network Charging and Control
Oracle Communications Network Integrity, versions 7.3.5, 7.3.6 Oracle Communications Network Integrity
Oracle Communications Offline Mediation Controller, version 12.0.0.3 Oracle Communications Offline Mediation Controller
Oracle Communications Operations Monitor, versions 3.4, 4.2, 4.3, 4.4, 5.0 Oracle Communications Operations Monitor
Oracle Communications Pricing Design Center, versions 12.0.0.3.0, 12.0.0.4.0 Oracle Communications Pricing Design Center
Oracle Communications Service Broker, version 6.2 Oracle Communications Service Broker
Oracle Communications Services Gatekeeper, version 7.0 Oracle Communications Services Gatekeeper
Oracle Communications Session Border Controller, versions 8.2, 8.3, 8.4, 9.0 Oracle Communications Session Border Controller
Oracle Communications Unified Inventory Management, versions 7.3.0, 7.3.4, 7.3.5, 7.4.0, 7.4.1, 7.4.2, 7.5.0 Oracle Communications Unified Inventory Management
Oracle Communications WebRTC Session Controller, versions 7.2.0, 7.2.1 Oracle Communications WebRTC Session Controller
Oracle Data Integrator, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Database Server, versions 12.1.0.2, 12.2.0.1, 19c, 21c Database
Oracle Demantra Demand Management, versions 12.2.6-12.2.11 Oracle Supply Chain Products
Oracle E-Business Suite, versions 12.2.3-12.2.11 Oracle E-Business Suite
Oracle Enterprise Communications Broker, version 3.3 Oracle Enterprise Communications Broker
Oracle Enterprise Data Quality, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Enterprise Session Border Controller, versions 8.4, 9.0 Oracle Enterprise Session Border Controller
Oracle Essbase, versions prior to 11.1.2.4.47, prior to 21.3 Database
Oracle Essbase Administration Services, versions prior to 11.1.2.4.47 Database
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.7-8.1.1 Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Behavior Detection Platform, versions 8.0.7, 8.0.8, 8.1.1 Oracle Financial Services Behavior Detection Platform
Oracle Financial Services Enterprise Case Management, versions 8.0.7, 8.0.8, 8.1.1 Oracle Financial Services Enterprise Case Management
Oracle Financial Services Foreign Account Tax Compliance Act Management, versions 8.0.7, 8.0.8, 8.1.1 Contact Support
Oracle Financial Services Model Management and Governance, versions 8.0.8-8.1.1 Oracle Financial Services Model Management and Governance
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition, versions 8.0.7, 8.0.8 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition
Oracle FLEXCUBE Investor Servicing, versions 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.4.0, 14.5.0 Contact Support
Oracle FLEXCUBE Private Banking, versions 12.0.0, 12.1.0 Contact Support
Oracle Fusion Middleware, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Fusion Middleware MapViewer, version 12.2.1.4.0 Fusion Middleware
Oracle GoldenGate, versions prior to 12.3.0.1, prior to 19.1.0.0.220118, prior to 21.4.0.0.0, prior to 21.5.0.0.220118 Database
Oracle GraalVM Enterprise Edition, versions 20.3.4, 21.3.0 Java SE
Oracle Graph Server and Client, versions prior to 21.4 Database
Oracle Health Sciences Clinical Development Analytics, version 4.0.1 Health Sciences
Oracle Health Sciences InForm CRF Submit, version 6.2.1 Health Sciences
Oracle Health Sciences Information Manager, versions 3.0.2, 3.0.3 HealthCare Applications
Oracle Healthcare Data Repository, versions 7.0.2, 8.1.0, 8.1.1 HealthCare Applications
Oracle Healthcare Foundation, versions 7.3.0.0-7.3.0.2, 8.0.0-8.0.2, 8.1.0-8.1.1 HealthCare Applications
Oracle Healthcare Translational Research, version 4.1.0 HealthCare Applications
Oracle Hospitality Cruise Shipboard Property Management System, version 20.1.0 Oracle Hospitality Cruise Shipboard Property Management System
Oracle Hospitality OPERA 5, version 5.6 Oracle Hospitality OPERA 5 Property Services
Oracle Hospitality Reporting and Analytics, version 9.1.0 Oracle Hospitality Reporting and Analytics
Oracle Hospitality Suite8, versions 8.10.2, 8.11.0, 8.12.0, 8.13.0, 8.14.0 Oracle Hospitality Suite8
Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Hyperion Infrastructure Technology, version 11.2.7.0 Fusion Middleware
Oracle iLearning, versions 6.2, 6.3 iLearning
Oracle Insurance Data Gateway, versions 11.0.2, 11.1.0, 11.2.7, 11.3.0, 11.3.1 Oracle Insurance Applications
Oracle Insurance Insbridge Rating and Underwriting, versions 5.2.0, 5.4.0-5.6.0 Oracle Insurance Applications
Oracle Insurance Policy Administration, versions 11.0.2, 11.1.0, 11.2.7, 11.3.0, 11.3.1 Oracle Insurance Applications
Oracle Insurance Policy Administration J2EE, versions 10.2.0, 10.2.4, 11.0.2, 11.1.0-11.3.0 Oracle Insurance Applications
Oracle Insurance Rules Palette, versions 10.2.0, 10.2.4, 11.0.2, 11.1.0-11.3.0, 11.3.1 Oracle Insurance Applications
Oracle Java SE, versions 7u321, 8u311, 11.0.13, 17.1 Java SE
Oracle Managed File Transfer, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle NoSQL Database, versions prior to 21.1.12 NoSQL Database
Oracle Policy Automation, versions 12.2.0-12.2.24 Oracle Policy Automation
Oracle Product Lifecycle Analytics, version 3.6.1 Oracle Supply Chain Products
Oracle Rapid Planning, versions 12.2.6-12.2.11 Oracle Supply Chain Products
Oracle Real User Experience Insight, versions 13.4.1.0, 13.5.1.0 Enterprise Manager
Oracle REST Data Services, versions prior to 21.2.4 Database
Oracle Retail Allocation, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Analytics, versions 16.0.0-16.0.2 Retail Applications
Oracle Retail Assortment Planning, version 16.0.3 Retail Applications
Oracle Retail Back Office, version 14.1 Retail Applications
Oracle Retail Central Office, version 14.1 Retail Applications
Oracle Retail Customer Insights, versions 16.0.0-16.0.2 Retail Applications
Oracle Retail Customer Management and Segmentation Foundation, versions 16.0-19.0 Retail Applications
Oracle Retail EFTLink, versions 16.0.3, 17.0.2, 18.0.1, 19.0.1, 20.0.1 Retail Applications
Oracle Retail Extract Transform and Load, version 13.2.8 Retail Applications
Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1 Retail Applications
Oracle Retail Fiscal Management, version 14.2 Retail Applications
Oracle Retail Integration Bus, versions 14.1.3.0, 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 Retail Applications
Oracle Retail Invoice Matching, versions 15.0.3, 16.0.3 Retail Applications
Oracle Retail Merchandising System, version 19.0.1 Retail Applications
Oracle Retail Order Broker, versions 16.0, 18.0, 19.1 Retail Applications
Oracle Retail Order Management System, version 19.5 Retail Applications
Oracle Retail Point-of-Service, version 14.1 Retail Applications
Oracle Retail Predictive Application Server, versions 14.1.3, 14.1.3.46, 15.0.3, 15.0.3.115, 16.0.3, 16.0.3.240 Retail Applications
Oracle Retail Price Management, versions 13.2, 14.0.4, 14.1, 14.1.3, 15, 15.0.3, 16, 16.0.3 Retail Applications
Oracle Retail Returns Management, version 14.1 Retail Applications
Oracle Retail Service Backbone, versions 14.1.3.0, 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 Retail Applications
Oracle Retail Size Profile Optimization, version 16.0.3 Retail Applications
Oracle Retail Xstore Point of Service, versions 17.0.4, 18.0.3, 19.0.2, 20.0.1 Retail Applications
Oracle SD-WAN Aware, version 8.2 Oracle SD-WAN Aware
Oracle SD-WAN Edge, versions 9.0, 9.1 Oracle SD-WAN Edge
Oracle Secure Backup, versions prior to 18.1.0.1.0 Oracle Secure Backup
Oracle Solaris, versions 10, 11 Systems
Oracle Spatial Studio, versions prior to 21.2.1 Database
Oracle Thesaurus Management System, versions 5.2.3, 5.3.0, 5.3.1 Health Sciences
Oracle TimesTen In-Memory Database, versions prior to 11.2.2.8.27, prior to 21.1.1.1.0 Database
Oracle Utilities Framework, versions 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0 Oracle Utilities Applications
Oracle Utilities Testing Accelerator, versions 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1 Oracle Utilities Applications
Oracle VM VirtualBox, versions prior to 6.1.32 Virtualization
Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebLogic Server, versions 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle ZFS Storage Appliance Kit, version 8.8 Systems
Oracle ZFS Storage Application Integration Engineering Software, version 1.3.3 Systems
OSS Support Tools, versions prior to 2.12.42 Oracle Support Tools
PeopleSoft Enterprise CS SA Integration Pack, versions 9.0, 9.2 PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.57, 8.58, 8.59 PeopleSoft
Primavera Analytics, versions 18.8.3.3, 19.12.11.1, 20.12.12.0 Oracle Construction and Engineering Suite
Primavera Data Warehouse, versions 18.8.3.3, 19.12.11.1, 20.12.12.0 Oracle Construction and Engineering Suite
Primavera Gateway, versions 17.12.0-17.12.11, 18.8.0-18.8.13, 19.12.0-19.12.12, 20.12.0-20.12.7, 21.12.0 Oracle Construction and Engineering Suite
Primavera P6 Enterprise Project Portfolio Management, versions 17.12.0.0-17.12.20.0, 18.8.0.0-18.8.24.0, 19.12.0.0-19.12.18.0, 20.12.0.0-20.12.12.0, 21.12.0.0 Oracle Construction and Engineering Suite
Primavera P6 Professional Project Management, versions 17.12.0.0-17.12.20.0, 18.8.0.0-18.8.24.0, 19.12.0.0-19.12.17.0, 20.12.0.0-20.12.9.0 Oracle Construction and Engineering Suite
Primavera Portfolio Management, versions 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0, 20.0.0.1 Oracle Construction and Engineering Suite
Primavera Unifier, versions 17.7-17.12, 18.8, 19.12, 20.12, 21.12 Oracle Construction and Engineering Suite
Siebel Applications, versions 21.12 and prior Siebel

Note:

  • Vulnerabilities affecting either Oracle Database or Oracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document, My Oracle Support Note 1967316.1 for information on patches to be applied to Fusion Application environments.
  • Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
  • Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris 10 customers should refer to the latest patch-sets which contain critical security patches detailed in Systems Patch Availability Document. Please see Reference Index of CVE IDs and Solaris Patches (My Oracle Support Note 1448883.1) for more information.
  • Users running Java SE with a browser can download the latest release from https://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product’s risk matrix.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • Abdelrhman Yousri: CVE-2022-21246, CVE-2022-21402, CVE-2022-21403
  • Alexander Kornbrust of Red Database Security: CVE-2022-21247
  • Andrej Simko of Accenture: CVE-2022-21251
  • Anonymous researcher working with Trend Micro’s Zero Day Initiative: CVE-2022-21279, CVE-2022-21280, CVE-2022-21284, CVE-2022-21285, CVE-2022-21286, CVE-2022-21287, CVE-2022-21288, CVE-2022-21289, CVE-2022-21290, CVE-2022-21307, CVE-2022-21308, CVE-2022-21309, CVE-2022-21346
  • Aobo Wang of Chaitin Security Research Lab: CVE-2022-21295
  • Dan Rabe: CVE-2022-21296
  • Dinh Ho Anh Khoa of Viettel Cyber Security: CVE-2021-35684, CVE-2022-21306
  • Fabian Meumertzheim of Code Intelligence: CVE-2022-21360, CVE-2022-21366
  • Frederic Quenneville of videotron.com: CVE-2022-21338
  • Hamed Ashraf: CVE-2022-21395, CVE-2022-21396, CVE-2022-21397, CVE-2022-21398, CVE-2022-21399, CVE-2022-21400, CVE-2022-21401
  • Hans Christian Woithe: CVE-2021-43395
  • Harold Siyu Zang of Trustwave: CVE-2022-21381, CVE-2022-21382, CVE-2022-21383
  • Jangggg of VNPT: CVE-2021-35587
  • Jeremy Nunn of Trustwave: CVE-2022-21383
  • Jie Liang of WingTecher Lab of Tsinghua University: CVE-2022-21303, CVE-2022-21304
  • Jingzhou Fu of WingTecher Lab of Tsinghua University: CVE-2022-21303, CVE-2022-21304
  • Jonah T: CVE-2021-35685, CVE-2022-21371
  • Jonni Passki of Apple Information Security: CVE-2022-21282
  • Kun Yang of Chaitin Security Research Lab: CVE-2022-21295
  • Liboheng of Tophant Starlight laboratory: CVE-2022-21261
  • Longofo of Knownsec 404 Team: CVE-2022-21252, CVE-2022-21260
  • Lucas Leong (wmliang) of Trend Micro Zero Day Initiative: CVE-2022-21310, CVE-2022-21311, CVE-2022-21312, CVE-2022-21313, CVE-2022-21314, CVE-2022-21315, CVE-2022-21316, CVE-2022-21317, CVE-2022-21318, CVE-2022-21319, CVE-2022-21320, CVE-2022-21321, CVE-2022-21322, CVE-2022-21323, CVE-2022-21324, CVE-2022-21325, CVE-2022-21326, CVE-2022-21327, CVE-2022-21328, CVE-2022-21329, CVE-2022-21330, CVE-2022-21331, CVE-2022-21332, CVE-2022-21333, CVE-2022-21334, CVE-2022-21335, CVE-2022-21336, CVE-2022-21337, CVE-2022-21355, CVE-2022-21356, CVE-2022-21357, CVE-2022-21380
  • Markus Loewe: CVE-2022-21293, CVE-2022-21294
  • Matei “Mal” Badanoiu: CVE-2022-21392
  • osword from SGLAB of Legendsec at Qi’anxin Group: CVE-2022-21347
  • Patrick Star of BMH Security Team: CVE-2022-21353
  • peterjson – Security Engineering – VNG Corporation: CVE-2021-35587
  • r00t4dm: CVE-2022-21252, CVE-2022-21257, CVE-2022-21258, CVE-2022-21259, CVE-2022-21260, CVE-2022-21261, CVE-2022-21262
  • RE:HACK: CVE-2022-21373
  • Reno Robert working with Trend Micro Zero Day Initiative: CVE-2022-21355, CVE-2022-21356, CVE-2022-21357, CVE-2022-21380
  • Ryota Shiga (Ga_ryo_) of Flatt Security working with Trend Micro Zero Day Initiative: CVE-2022-21394
  • Sander Meijering of HackDefense: CVE-2021-35685, CVE-2022-21371
  • Thijmen Kooy of HackDefense: CVE-2021-35685, CVE-2022-21371
  • thiscodecc of MoyunSec V-Lab: CVE-2022-21292, CVE-2022-21350, CVE-2022-21361
  • Victor Rodriguez: CVE-2022-21364
  • Yaoguang Chen of Ant Security Light-Year Lab: CVE-2022-21303, CVE-2022-21304
  • Zhiqiang Zang of University of Texas at Austin: CVE-2022-21305
  • Zhiyong Wu of WingTecher Lab of Tsinghua University: CVE-2022-21303, CVE-2022-21304

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program:

  • Huixin Ma of Tencent.com [2 reports]
  • Liying Wang
  • Longofo of Knownsec 404 Team
  • r00t4dm
  • Robin Textor

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.

For this quarter, Oracle recognizes the following for contributions to Oracle’s On-Line Presence Security program:

  • Abderrahmane Elghoul
  • Abilash V L
  • Abisheik M
  • Adam Willard
  • Aleena Avarachan
  • Ali Alzahrani
  • Aniket Nimkar
  • Ashik Kunjumon
  • B.Dhiyaneshwaran aka (Geek Freak) [2 reports]
  • Dhanesh Sivasamy
  • Dor Tumarkin, Principal Application Security Researcher at Checkmarx
  • Gaurang Maheta [2 reports]
  • Jangggg of VNPT
  • Kishore Hariram
  • Lidor Ben Shitrit from Orca Security
  • Lokesh Rulz
  • Malicious.Group
  • Mohit Ahir
  • N3td1v3r
  • Nightwatch Cybersecurity Research
  • peterjson – Security Engineering – VNG Corporation
  • pinkflower
  • Quan Doan of R&D Center – VinCSS LLC (a member of Vingroup)
  • Rahul PS
  • Rob Evans of Fortinet, Inc.
  • Rounak Sharma
  • Sakhare Vinayak
  • Samprit Das (sampritdas8)
  • Saptak Saha
  • Shubham Choudhery
  • Shuvam Adhikari [4 reports]
  • Srikar V – exp1o1t9r
  • Truffle Security Co
  • Yeswanth Reddy

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

  • 19 April 2022
  • 19 July 2022
  • 18 October 2022
  • 17 January 2023

References

Modification History

Date Note
2022-March-14 Rev 6. Updated the version details and addtional CVEs (CVE-2022-23302, CVE-2022-23305 and CVE-2022-23307) for Oracle WebLogic Server
2022-Januray-31 Rev 5. Version details updated for Oracle HTTP Server and Oracle Business Activity Monitoring
2022-Januray-27 Rev 4. Retail matrix version changes and added credit for CVE-2022-21353
2022-Januray-24 Rev 3. CVSS update for CVE-2022-21392 and aded credit for CVE-2022-21346
2022-January-18 Rev 2. Updated Siebel Applications versions and added couple of credit names
2022-January-18 Rev 1. Initial Release

Oracle Database Products Risk Matrices

This Critical Patch Update contains 28 new security patches for Oracle Database Products divided as follows:

  • 4 new security patches for Oracle Database Products
  • 1 new security patch for Oracle Airlines Data Model
  • 2 new security patches for Oracle Big Data Graph
  • 1 new security patch for Oracle Communications Data Model
  • 4 new security patches for Oracle Essbase
  • 3 new security patches for Oracle GoldenGate
  • 2 new security patches for Oracle Graph Server and Client
  • 1 new security patch for Oracle NoSQL Database
  • 2 new security patches for Oracle REST Data Services
  • 2 new security patches for Oracle Secure Backup
  • 1 new security patch for Oracle Spatial Studio
  • 5 new security patches for Oracle TimesTen In-Memory Database

Oracle Database Server Risk Matrix

This Critical Patch Update contains 4 new security patches plus additional third party patches noted below for Oracle Database Products. None of these vulnerabilities may be remotely exploitable without authentication, i.e., none may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-37695 Oracle Application Express (CKEditor) Valid User Account HTTP No 5.4 Network Low Low Required Changed Low Low None Prior to 21.1.4
CVE-2022-21393 Java VM Create Procedure Oracle Net No 4.3 Network Low Low None Un-

changed
None None Low 12.1.0.2, 12.2.0.1, 19c, 21c
CVE-2021-32723 Oracle Application Express (Prism) Valid User Account HTTP No 3.5 Network Low Low Required Un-

changed
None None Low Prior to 21.1.4
CVE-2022-21247 Core RDBMS Create Session, Execute Catalog Role Oracle Net No 2.7 Network Low High None Un-

changed
Low None None 12.2.0.1, 19c

Additional CVEs addressed are:

  • The patch for CVE-2021-37695 also addresses CVE-2021-32808 and CVE-2021-32809.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Database Configuration Assistant (Apache Commons Compress): CVE-2021-36090, CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • Oracle Spatial and Graph (Apache Log4j): CVE-2021-45105.
  • Trace file analyzer (Apache Log4j): CVE-2021-45105.
  • Workload Manager (Guava): CVE-2020-8908.
  • Workload Manager (Jetty): CVE-2021-28165, CVE-2021-28169 and CVE-2021-34428.

Oracle Airlines Data Model Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Airlines Data Model. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Airlines Data Model Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.0.1.0, 12.1.1.0.0

Oracle Big Data Graph Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Big Data Graph. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Big Data Spatial and Graph Big Data Graph (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 23.1
CVE-2021-30639 Big Data Spatial and Graph Big Data Graph (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 23.1

Oracle Communications Data Model Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Communications Data Model. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Communications Data Model Utilities (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 11.3.2.2.0, 12.1.2.0.0, 12.1.0.1.0, 11.3.2.3.0, 11.3.2.1.0

Oracle Essbase Risk Matrix

This Critical Patch Update contains 4 new security patches plus additional third party patches noted below for Oracle Essbase. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-35683 Oracle Essbase Administration Services EAS Console HTTP No 9.9 Network Low Low None Changed High High High Prior to 11.1.2.4.047
CVE-2021-3711 Oracle Essbase Infrastructure (OpenSSL) HTTPS Yes 9.8 Network Low None None Un-

changed
High High High Prior to 11.1.2.4.047, Prior to 21.3
CVE-2021-22901 Oracle Essbase Build (cURL) HTTPS Yes 7.5 Network High None Required Un-

changed
High High High Prior to 11.1.2.4.047, Prior to 21.3
CVE-2021-20718 Oracle Essbase Infrastructure (mod_auth_openidc) Multiple Yes 7.5 Network Low None None Un-

changed
None None High Prior to 21.3

Additional CVEs addressed are:

  • The patch for CVE-2021-22901 also addresses CVE-2021-22897 and CVE-2021-22898.
  • The patch for CVE-2021-3711 also addresses CVE-2021-3712.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Essbase
    • Infrastructure (Apache Commons Compress): CVE-2021-36090, CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.

Oracle GoldenGate Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle GoldenGate. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-23017 Oracle GoldenGate GG Market Place for Support (nginx) UDP Yes 9.4 Network Low None None Un-

changed
High High Low Prior to 21.4.0.0.0
CVE-2021-2351 Oracle GoldenGate Database (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 21.5.0.0.220118, Prior to 19.1.0.0.220118, Prior to 12.3.0.1
CVE-2018-1311 Oracle GoldenGate Build Request (Apache Xerces-C++) HTTP Yes 8.1 Network High None None Un-

changed
High High High Prior to 21.4.0.0.0

Oracle Graph Server and Client Risk Matrix

This Critical Patch Update contains 2 new security patches plus additional third party patches noted below for Oracle Graph Server and Client. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Graph Server and Client Packaging/install issues (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 21.4
CVE-2021-33037 Oracle Graph Server and Client Packaging/Install (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None Prior to 21.4

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Graph Server and Client
    • Packaging/Install (Apache Commons IO): CVE-2021-29425.

Oracle NoSQL Database Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle NoSQL Database. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-21409 Oracle NoSQL Database Administration (Netty) Local Logon No 5.5 Local Low Low None Un-

changed
High None None Prior to 21.1.12

Oracle REST Data Services Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle REST Data Services. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-28165 Oracle REST Data Services General (Eclipse Jetty) Multiple Yes 7.5 Network Low None None Un-

changed
None None High Prior to 21.2.0
CVE-2021-32014 Oracle REST Data Services General (SheetJS) Local Logon No 3.3 Local Low None Required Un-

changed
None None Low Prior to 21.2.4

Additional CVEs addressed are:

  • The patch for CVE-2021-28165 also addresses CVE-2021-28169 and CVE-2021-34428.
  • The patch for CVE-2021-32014 also addresses CVE-2021-32012 and CVE-2021-32013.

Oracle Secure Backup Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Secure Backup. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-26691 Oracle Secure Backup Oracle Secure Backup (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High Prior to 18.1.0.1.0
CVE-2021-3712 Oracle Secure Backup Oracle Secure Backup (OpenSSL) HTTPS Yes 7.4 Network High None None Un-

changed
High None High Prior to 18.1.0.1.0

Additional CVEs addressed are:

  • The patch for CVE-2021-26691 also addresses CVE-2021-33193 and CVE-2021-42013.

Oracle Spatial Studio Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Spatial Studio. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Spatial Studio Install (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 21.2.1

Oracle TimesTen In-Memory Database Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle TimesTen In-Memory Database. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle TimesTen In-Memory Database EM TimesTen plug-in (JDBC,OCCI) OracleNet Yes 8.3 Network High None Required Changed High High High Prior to 21.1.1.1.0
CVE-2021-29923 Oracle TimesTen In-Memory Database EM TimesTen plug-in (Go) TCP/IP Yes 7.5 Network Low None None Un-

changed
None High None Prior to 21.1.1.1.0
CVE-2021-29923 Oracle TimesTen In-Memory Database Install (Go) TCP/IP Yes 7.5 Network Low None None Un-

changed
None High None Prior to 21.1.1.1.0
CVE-2020-7712 Oracle TimesTen In-Memory Database TimesTen Infrastructure (Apache ZooKeeper) HTTP No 7.2 Network Low High None Un-

changed
High High High Prior to 21.1.1.1.0
CVE-2020-11979 Oracle TimesTen In-Memory Database Install (Apache Ant) Local Logon No 6.5 Network Low Low None Un-

changed
None High None Prior to 11.2.2.8.27

Additional CVEs addressed are:

  • The patch for CVE-2020-11979 also addresses CVE-2020-1945, CVE-2021-36373 and CVE-2021-36374.
  • The patch for CVE-2021-29923 also addresses CVE-2021-34558 and CVE-2021-36221.

Oracle Commerce Risk Matrix

This Critical Patch Update contains 6 new security patches for Oracle Commerce. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Commerce Platform Dynamo Application Framework (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 11.3.0, 11.3.1, 11.3.2
CVE-2021-36090 Oracle Commerce Guided Search Content Acquisition System (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.3.2
CVE-2021-37137 Oracle Commerce Guided Search Content Acquisition System (Netty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.3.2
CVE-2020-13935 Oracle Commerce Guided Search Endeca Application Controller (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 11.3.2
CVE-2022-21387 Oracle Commerce Platform Dynamo Application Framework HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 11.3.0, 11.3.1, 11.3.2
CVE-2021-29425 Oracle Commerce Guided Search Content Acquisition System (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 11.3.2

Additional CVEs addressed are:

  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • The patch for CVE-2021-37137 also addresses CVE-2021-37136.

Oracle Communications Applications Risk Matrix

This Critical Patch Update contains 33 new security patches for Oracle Communications Applications. 22 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21275 Oracle Communications Billing and Revenue Management Connection Manager HTTP Yes 10.0 Network Low None None Changed High High High 12.0.0.3, 12.0.0.4
CVE-2022-21389 Oracle Communications Billing and Revenue Management Connection Manager HTTP Yes 10.0 Network Low None None Changed High High High 12.0.0.3, 12.0.0.4
CVE-2022-21390 Oracle Communications Billing and Revenue Management Webservices Manager HTTP Yes 10.0 Network Low None None Changed High High High 12.0.0.3, 12.0.0.4
CVE-2022-21276 Oracle Communications Billing and Revenue Management Connection Manager HTTP No 9.9 Network Low Low None Changed High High High 12.0.0.3, 12.0.0.4
CVE-2022-21391 Oracle Communications Billing and Revenue Management Connection Manager HTTP No 9.9 Network Low Low None Changed High High High 12.0.0.3, 12.0.0.4
CVE-2021-39139 Oracle Communications BRM – Elastic Charging Engine Updater (XStream) TCP No 8.8 Network Low Low None Un-

changed
High High High 11.3, 12.0
CVE-2021-29505 Oracle Communications Unified Inventory Management Rulesets (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 7.3.4, 7.3.5, 7.4.0, 7.4.1, 7.4.2
CVE-2021-2351 Oracle Communications Calendar Server Administration (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.0.5.0
CVE-2021-2351 Oracle Communications Contacts Server Database (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.0.3.0
CVE-2021-2351 Oracle Communications Convergent Charging Controller ACS (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0
CVE-2021-2351 Oracle Communications Design Studio OSM, NI Plugins (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 7.3.5, 7.4.0, 7.4.1, 7.4.2
CVE-2021-2351 Oracle Communications Network Charging and Control ACS (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.0.1.0.0, 12.0.1.0.0-12.0.4.0.0
CVE-2021-2351 Oracle Communications Network Integrity Installer (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 7.3.5, 7.3.6
CVE-2020-28052 Oracle Communications Convergence Messaging (Bouncy Castle Java Library) S/MIME Yes 8.1 Network High None None Un-

changed
High High High 3.0.2.2.0
CVE-2020-24750 Oracle Communications Instant Messaging Server PresenceApi (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 10.0.1.5.0
CVE-2020-24750 Oracle Communications Offline Mediation Controller Installer (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.0.0.3
CVE-2020-24750 Oracle Communications Pricing Design Center Installation (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.0.0.4.0
CVE-2021-22118 Oracle Communications Unified Inventory Management TMF API (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 7.4.1, 7.4.2, 7.5.0
CVE-2022-21266 Oracle Communications Billing and Revenue Management Pipeline Manager HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.0.0.3, 12.0.0.4
CVE-2021-25122 Oracle Communications Instant Messaging Server DBPlugin (Apache Tomcat) XMPP Yes 7.5 Network Low None None Un-

changed
High None None 10.0.1.5.0
CVE-2021-37714 Oracle Communications Messaging Server ISC (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.1
CVE-2021-36090 Oracle Communications Unified Inventory Management Inventory Organizer (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 7.4.0, 7.4.1, 7.4.2, 7.5.0
CVE-2019-10086 Oracle Communications Convergence Message Store (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 3.0.2.2.0
CVE-2019-10086 Oracle Communications Design Studio Inventory (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 7.3.4, 7.3.5, 7.4.0
CVE-2020-5421 Oracle Communications Design Studio Inventory (Spring Framework) HTTP No 6.5 Network High Low Required Changed Low High None 7.3.4, 7.3.5, 7.4.0
CVE-2021-36374 Oracle Communications Unified Inventory Management Build Tool (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 7.3.0, 7.4.0, 7.4.1, 7.4.2, 7.5.0
CVE-2021-29425 Oracle Communications BRM – Elastic Charging Engine Charging Controller (Apache Commons IO) TCP Yes 4.8 Network High None None Un-

changed
Low Low None 12.0
CVE-2021-29425 Oracle Communications Convergence Convergence Server (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 3.0.2.2.0
CVE-2021-29425 Oracle Communications Offline Mediation Controller Installation (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.0.0.3
CVE-2022-21338 Oracle Communications Convergence General Framework HTTP No 4.6 Network Low Low Required Un-

changed
Low Low None 3.0.2.2.0
CVE-2022-21267 Oracle Communications Billing and Revenue Management Pipeline Manager None No 3.3 Local Low Low None Un-

changed
Low None None 12.0.0.3, 12.0.0.4
CVE-2022-21268 Oracle Communications Billing and Revenue Management Pipeline Manager None No 3.3 Local Low Low None Un-

changed
Low None None 12.0.0.3, 12.0.0.4
CVE-2022-21388 Oracle Communications Pricing Design Center On Premise Install None No 3.3 Local Low Low None Un-

changed
Low None None 12.0.0.3.0, 12.0.0.4.0

Additional CVEs addressed are:

  • The patch for CVE-2020-24750 also addresses CVE-2020-24616, CVE-2020-25649 and CVE-2020-36189.
  • The patch for CVE-2021-25122 also addresses CVE-2020-13934, CVE-2020-13935, CVE-2020-17527, CVE-2021-25329 and CVE-2021-33037.
  • The patch for CVE-2021-29505 also addresses CVE-2021-39154.
  • The patch for CVE-2021-39139 also addresses CVE-2021-29505, CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153 and CVE-2021-39154.

Oracle Communications Risk Matrix

This Critical Patch Update contains 84 new security patches plus additional third party patches noted below for Oracle Communications. 50 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-23440 Oracle Communications Cloud Native Core Policy Policy (set-value) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 1.14.0
CVE-2021-21783 Oracle Communications EAGLE Application Processor Platform (gSOAP) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 16.1-16.4
CVE-2021-32827 Oracle Communications Cloud Native Core Policy Policy (MockServer) HTTP Yes 9.6 Network Low None Required Changed High High High 1.14.0
CVE-2021-27568 Oracle Communications Cloud Native Core Policy Policy (netplex json-smart) HTTP Yes 9.1 Network Low None None Un-

changed
High None High 1.14.0
CVE-2021-39139 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 1.10.0
CVE-2019-13734 Oracle Communications Cloud Native Core Network Repository Function NRF (SQLite) HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 1.14.0
CVE-2020-13936 Oracle Communications Cloud Native Core Policy Policy (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 1.14.0
CVE-2020-15824 Oracle Communications Cloud Native Core Policy Policy (Kotlin) HTTP No 8.8 Network Low Low None Un-

changed
High High High 1.14.0
CVE-2020-10878 Oracle Communications EAGLE Application Processor Platform (Perl) HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 16.1-16.4
CVE-2021-39153 Oracle Communications Cloud Native Core Policy Signaling (XStream) HTTP No 8.5 Network High Low None Changed High High High 1.14.0
CVE-2020-36189 Oracle Communications Cloud Native Core Policy Policy (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 1.14.0
CVE-2021-22118 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 1.9.0
CVE-2021-22118 Oracle Communications Cloud Native Core Policy Policy (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 1.14.0
CVE-2021-22118 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 1.6.0
CVE-2021-22118 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 1.14.0
CVE-2021-22118 Oracle Communications Cloud Native Core Unified Data Repository UDR (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 1.14.0
CVE-2021-33909 Oracle Communications Session Border Controller Core (Kernel) None No 7.8 Local Low Low None Un-

changed
High High High 8.2, 8.3, 8.4, 9.0
CVE-2022-21382 Oracle Enterprise Session Border Controller WebUI HTTP No 7.7 Network Low Low None Changed None High None 8.4, 9.0
CVE-2020-17527 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.10.0
CVE-2021-37137 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (Netty) TCP Yes 7.5 Network Low None None Un-

changed
None None High 1.10.0
CVE-2021-33560 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (libgcrypt) TCP Yes 7.5 Network Low None None Un-

changed
High None None 1.9.0
CVE-2020-13949 Oracle Communications Cloud Native Core Policy Policy (Apache Thrift) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2020-17527 Oracle Communications Cloud Native Core Policy Policy (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.14.0
CVE-2021-28165 Oracle Communications Cloud Native Core Policy Policy (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2021-22119 Oracle Communications Cloud Native Core Policy Policy (Spring Security) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2020-28469 Oracle Communications Cloud Native Core Policy Policy (glob-parent) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2021-25122 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.6.0
CVE-2021-36090 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2021-36090 Oracle Communications Cloud Native Core Unified Data Repository UDR (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 1.14.0
CVE-2021-37137 Oracle Communications Diameter Signaling Router API Gateway (Netty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.5.0.2
CVE-2021-42340 Oracle Communications Diameter Signaling Router Platform (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.5.0.2
CVE-2021-42340 Oracle SD-WAN Edge Management (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 9.0, 9.1
CVE-2021-23337 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 1.9.0
CVE-2022-21395 Oracle Communications Operations Monitor Mediation Engine HTTP No 7.2 Network Low High None Un-

changed
High High High 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2021-23337 Oracle Communications Services Gatekeeper Policy service (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 7.0
CVE-2021-21703 Oracle Communications Diameter Signaling Router Platform (PHP) None No 7.0 Local High Low None Un-

changed
High High High 8.0.0.0-8.5.0.2
CVE-2021-44832 Oracle Communications Diameter Signaling Router Virtual Network Function Manager, API Gateway (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 8.3.0.0-8.5.1.0 See Note 1
CVE-2021-44832 Oracle Communications Interactive Session Recorder RSS (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 6.3, 6.4 See Note 1
CVE-2022-21399 Oracle Communications Operations Monitor Mediation Engine HTTP No 6.6 Network Low High None Changed Low Low Low 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21401 Oracle Communications Operations Monitor Mediation Engine HTTP No 6.6 Network Low High None Changed Low Low Low 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21403 Oracle Communications Operations Monitor Mediation Engine HTTP No 6.6 Network Low High None Changed Low Low Low 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21381 Oracle Enterprise Session Border Controller WebUI HTTP No 6.4 Network Low Low None Changed Low Low None 8.4, 9.0
CVE-2020-11022 Oracle Communications EAGLE Application Processor Platform (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 16.1-16.4
CVE-2020-11022 Oracle Communications Services Gatekeeper API Portal (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 7.0
CVE-2021-21409 Oracle Communications Cloud Native Core Console Console (Netty) HTTP Yes 5.9 Network High None None Un-

changed
None High None 1.7.0
CVE-2020-14340 Oracle Communications Cloud Native Core Network Repository Function Network Repository Function (XNIO) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.14.0
CVE-2020-14340 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (XNIO) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.15.0
CVE-2021-33880 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (aaugustin websockets) HTTP Yes 5.9 Network High None None Un-

changed
High None None 1.5.0
CVE-2021-3326 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (glibc) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.5.0
CVE-2020-14340 Oracle Communications Cloud Native Core Service Communication Proxy SCP (XNIO) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.14.0
CVE-2021-33880 Oracle Communications Cloud Native Core Service Communication Proxy SCP (aaugustin websockets) HTTP Yes 5.9 Network High None None Un-

changed
High None None 1.14.0
CVE-2020-14340 Oracle Communications Cloud Native Core Unified Data Repository UDR (XNIO) HTTP Yes 5.9 Network High None None Un-

changed
None None High 1.14.0
CVE-2021-33880 Oracle Communications Cloud Native Core Unified Data Repository UDR (aaugustin websockets) HTTP Yes 5.9 Network High None None Un-

changed
High None None 1.14.0
CVE-2021-45105 Oracle Communications Service Broker Integration (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 6.2 See Note 1
CVE-2021-45105 Oracle Communications Services Gatekeeper API Portal (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 7.0 See Note 1
CVE-2021-45105 Oracle Communications WebRTC Session Controller Signaling Engine, Media Engine (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 7.2.0, 7.2.1 See Note 1
CVE-2021-3426 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (Python) Multiple No 5.7 Adjacent

Network
Low Low None Un-

changed
High None None 1.10.0
CVE-2021-23017 Oracle Communications Session Border Controller Routing (nginx) HTTP Yes 5.6 Network High None None Un-

changed
Low Low Low 8.4, 9.0
CVE-2021-23017 Oracle Enterprise Communications Broker Routing (nginx) HTTP Yes 5.6 Network High None None Un-

changed
Low Low Low 3.3
CVE-2021-23017 Oracle Enterprise Session Border Controller Routing (nginx) HTTP Yes 5.6 Network High None None Un-

changed
Low Low Low 8.4, 9.0
CVE-2020-27618 Oracle Communications Cloud Native Core Service Communication Proxy SCP (glibc) None No 5.5 Local Low Low None Un-

changed
None None High 1.14.0
CVE-2022-21246 Oracle Communications Operations Monitor Mediation Engine HTTP No 5.4 Network Low Low Required Changed Low Low None 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21396 Oracle Communications Operations Monitor Mediation Engine HTTP No 5.4 Network Low Low Required Changed Low Low None 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21397 Oracle Communications Operations Monitor Mediation Engine HTTP No 5.4 Network Low Low Required Changed Low Low None 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21398 Oracle Communications Operations Monitor Mediation Engine HTTP No 5.4 Network Low Low Required Changed Low Low None 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21400 Oracle Communications Operations Monitor Mediation Engine HTTP No 5.4 Network Low Low Required Changed Low Low None 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2021-34429 Oracle Communications Cloud Native Core Binding Support Function Binding Support Function (Eclipse Jetty) TCP Yes 5.3 Network Low None None Un-

changed
Low None None 1.10.0
CVE-2021-34429 Oracle Communications Cloud Native Core Security Edge Protection Proxy SEPP (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.5.0
CVE-2020-13956 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Apache HttpClient) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 1.14.0
CVE-2021-33037 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 1.14.0
CVE-2021-34429 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.14.0
CVE-2020-29582 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Kotlin) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.14.0
CVE-2021-34429 Oracle Communications Cloud Native Core Unified Data Repository UDR (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 1.14.0
CVE-2021-34429 Oracle Communications Diameter Signaling Router API Gateway (Eclipse Jetty) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.0.0.0-8.5.0.2
CVE-2021-21705 Oracle SD-WAN Aware Management (PHP) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 8.2
CVE-2020-8554 Oracle Communications Cloud Native Core Service Communication Proxy SCP (Kubernetes API) HTTP No 5.0 Network High Low None Un-

changed
Low Low Low 1.14.0
CVE-2020-8554 Oracle Communications Cloud Native Core Unified Data Repository UDR (Kubernetes API) HTTP No 5.0 Network High Low None Un-

changed
Low Low Low 1.14.0
CVE-2021-29921 Oracle Communications Cloud Native Core Automated Test Suite ATS Framework (Python) HTTP No 4.9 Network Low High None Un-

changed
None High None 1.8.0
CVE-2021-29425 Oracle Communications Cloud Native Core Network Repository Function NRF (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 1.14.0
CVE-2021-29425 Oracle Communications Cloud Native Core Unified Data Repository UDR (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 1.14.0
CVE-2022-21402 Oracle Communications Operations Monitor Mediation Engine HTTP No 4.8 Network Low High Required Changed Low Low None 3.4, 4.2, 4.3, 4.4, 5.0
CVE-2022-21383 Oracle Enterprise Session Border Controller Log HTTP No 4.3 Network Low Low None Un-

changed
None None Low 8.4, 9.0
CVE-2021-3448 Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration (dnsmasq) TCP Yes 4.0 Network High None None Changed None Low None 1.9.0
CVE-2020-8908 Oracle Communications Cloud Native Core Unified Data Repository UDR (Guava) None No 3.3 Local Low Low None Un-

changed
Low None None 1.14.0

Notes:

  1. This patch also addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers need not apply the patches/mitigations of Security Alert CVE-2021-44228 and CVE-2021-45046 for this product.

Additional CVEs addressed are:

  • The patch for CVE-2020-10878 also addresses CVE-2020-10543 and CVE-2020-12723.
  • The patch for CVE-2020-11022 also addresses CVE-2019-11358 and CVE-2020-11023.
  • The patch for CVE-2020-17527 also addresses CVE-2020-13934, CVE-2020-13935, CVE-2020-9484, CVE-2021-25122, CVE-2021-25329, CVE-2021-30369, CVE-2021-30640 and CVE-2021-33037.
  • The patch for CVE-2020-36189 also addresses CVE-2020-35490, CVE-2020-35491, CVE-2020-35728, CVE-2020-36179, CVE-2020-36180, CVE-2020-36181, CVE-2020-36182, CVE-2020-36183, CVE-2020-36184, CVE-2020-36185, CVE-2020-36186, CVE-2020-36187 and CVE-2020-36188.
  • The patch for CVE-2021-23337 also addresses CVE-2020-28500.
  • The patch for CVE-2021-25122 also addresses CVE-2021-25329.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • The patch for CVE-2021-37137 also addresses CVE-2021-37136.
  • The patch for CVE-2021-39139 also addresses CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153 and CVE-2021-39154.
  • The patch for CVE-2021-39153 also addresses CVE-2021-39139, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152 and CVE-2021-39154.
  • The patch for CVE-2021-42340 also addresses CVE-2021-33037.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications Cloud Native Core Network Repository Function
    • NRF (Apache Commons Compress): CVE-2021-36090, CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.

Oracle Construction and Engineering Risk Matrix

This Critical Patch Update contains 22 new security patches for Oracle Construction and Engineering. 15 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-44790 Instantis EnterpriseTrack Core (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 17.1, 17.2, 17.3
CVE-2021-42575 Primavera Unifier Platform, Data Persistence (OWASP Java HTML Sanitizer) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 17.7-17.12, 18.8, 19.12, 20.12, 21.12
CVE-2021-2351 Primavera Analytics ETL (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 18.8.3.3, 19.12.11.1, 20.12.12.0
CVE-2021-2351 Primavera Data Warehouse ETL (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 18.8.3.3, 19.12.11.1, 20.12.12.0
CVE-2021-2351 Primavera P6 Enterprise Project Portfolio Management Web Access (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.12.0.0-17.12.20.0, 18.8.0.0-18.8.24.0, 19.12.0.0-19.12.17.0, 20.12.0.0-20.12.9.0
CVE-2021-2351 Primavera P6 Professional Project Management API component of P6 Pro (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.12.0.0-17.12.20.0, 18.8.0.0-18.8.24.0, 19.12.0.0-19.12.17.0, 20.12.0.0-20.12.9.0
CVE-2021-2351 Primavera Unifier Platform,Data Access,Data Persistence (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.7-17.12, 18.8, 19.12, 20.12, 21.12
CVE-2021-37714 Primavera Unifier Platform,Data Parsing (jsoup) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 20.12, 21.12
CVE-2021-44832 Primavera Gateway Admin (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 17.12.0-17.12.11, 18.8.0-18.8.13, 19.12.0-19.12.12, 20.12.0-20.12.7, 21.12.0 See Note 1
CVE-2021-44832 Primavera P6 Enterprise Project Portfolio Management Web Access (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 19.12.0.0-19.12.18.0, 20.12.0.0-20.12.12.0, 21.12.0.0 See Note 1
CVE-2021-44832 Primavera Unifier Logging (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 18.8, 19.12, 20.12, 21.12 See Note 1
CVE-2022-21269 Primavera Portfolio Management Web Access HTTP Yes 6.1 Network Low None Required Changed Low Low None 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0, 20.0.0.1
CVE-2021-45105 Instantis EnterpriseTrack Logging (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 17.1, 17.2, 17.3 See Note 1
CVE-2021-38153 Primavera Unifier Event Streams and Communications (Apache Kafka) HTTP Yes 5.9 Network High None None Un-

changed
High None None 18.8, 19.12, 20.12, 21.12
CVE-2022-21377 Primavera Portfolio Management Web API HTTP Yes 5.4 Network Low None Required Un-

changed
Low Low None 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0
CVE-2022-21242 Primavera Portfolio Management Web Access HTTP No 5.4 Network Low Low Required Changed Low Low None 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0, 20.0.0.1
CVE-2022-21376 Primavera Portfolio Management Web Access HTTP Yes 5.4 Network Low None Required Un-

changed
Low Low None 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0
CVE-2022-21281 Primavera Portfolio Management Web Access HTTP No 4.8 Network Low High Required Changed Low Low None 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0, 20.0.0.1
CVE-2021-29425 Primavera Unifier Platform (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 17.7-17.12, 18.8, 19.12, 20.12, 21.12
CVE-2022-21243 Primavera Portfolio Management Web Access HTTP No 4.3 Network Low Low None Un-

changed
None None Low 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0, 20.0.0.1
CVE-2022-21244 Primavera Portfolio Management Web Access HTTP Yes 4.3 Network Low None Required Un-

changed
None Low None 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0, 20.0.0.1
CVE-2020-8908 Primavera Unifier Data Service (Guava) None No 3.3 Local Low Low None Un-

changed
Low None None 17.7-17.12, 18.8, 19.12, 20.12, 21.12

Notes:

  1. This patch also addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers need not apply the patches/mitigations of Security Alert CVE-2021-44228 and CVE-2021-45046 for this product.

Additional CVEs addressed are:

  • The patch for CVE-2021-44790 also addresses CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438, CVE-2021-41524, CVE-2021-41773, CVE-2021-42013 and CVE-2021-44224.
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 9 new security patches for Oracle E-Business Suite. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the January 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (January 2022), My Oracle Support Note 2484000.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21255 Oracle Configurator UI Servlet HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.2.3-12.2.11
CVE-2022-21273 Oracle Project Costing Expenses, Currency Override HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.2.3-12.2.11
CVE-2022-21274 Oracle Sourcing Intelligence, RFx Creation HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.2.3-12.2.11
CVE-2022-21250 Oracle Trade Management GL Accounts HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.2.3-12.2.11
CVE-2022-21251 Oracle Installed Base Instance Main HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.3-12.2.11
CVE-2019-10086 Oracle Time and Labor Timecard (Apache Commons Beanutils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 12.2.6-12.2.11
CVE-2020-6950 Oracle Time and Labor Timecard (Eclipse Mojarra) HTTP Yes 6.5 Network Low None Required Un-

changed
High None None 12.2.6-12.2.11
CVE-2022-21354 Oracle iStore User Interface HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.3-12.2.11
CVE-2022-21373 Oracle Partner Management Reseller Locator HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.3-12.2.11

Additional CVEs addressed are:

  • The patch for CVE-2020-6950 also addresses CVE-2019-17091.

Oracle Enterprise Manager Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Enterprise Manager. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the January 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2817011.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3177 Enterprise Manager Ops Center Networking (Python) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.4.0.0
CVE-2022-21392 Enterprise Manager Base Platform Policy Framework None No 8.8 Local Low Low None changed High High High 13.4.0.0, 13.5.0.0
CVE-2021-2351 Application Performance Management End User Experience Management (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 13.4.1.0, 13.5.1.0
CVE-2021-2351 Enterprise Manager Base Platform Enterprise Manager Install (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 13.4.0.0, 13.5.0.0
CVE-2021-2351 Enterprise Manager Ops Center Networking (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.4.0.0
CVE-2021-2351 Oracle Application Testing Suite Load Testing for Web Apps (JDBC, OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 13.3.0.1
CVE-2021-2351 Oracle Real User Experience Insight End User Experience Management (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 13.4.1.0, 13.5.1.0

Additional CVEs addressed are:

  • The patch for CVE-2021-3177 also addresses CVE-2021-23336.

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 48 new security patches for Oracle Financial Services Applications. 37 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2019-17495 Oracle Banking APIs Framework (Swagger UI) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2019-17495 Oracle Banking Digital Experience Framework (Swagger UI) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2020-13936 Oracle Banking Deposits and Lines of Credit Servicing Web UI (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 2.12.0
CVE-2020-13936 Oracle Banking Enterprise Default Management Collections (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 2.3.0-2.4.1, 2.6.2, 2.7.1, 2.10.0, 2.12.0
CVE-2020-13936 Oracle Banking Loans Servicing Web UI (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 2.12.0
CVE-2020-13936 Oracle Banking Party Management Web UI (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 2.7.0
CVE-2020-13936 Oracle Banking Platform Security (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 2.3.0-2.4.1, 2.6.2, 2.7.1
CVE-2021-2351 Oracle Banking APIs Framework (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-2351 Oracle Banking Digital Experience Framework (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.2, 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-2351 Oracle Financial Services Analytical Applications Infrastructure Rate Management (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.7-8.1.1
CVE-2021-2351 Oracle Financial Services Behavior Detection Platform Third Party (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.7, 8.0.8, 8.1.1
CVE-2021-2351 Oracle Financial Services Enterprise Case Management Installers (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.7, 8.0.8, 8.1.1
CVE-2021-2351 Oracle Financial Services Foreign Account Tax Compliance Act Management Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.7, 8.0.8, 8.1.1
CVE-2021-2351 Oracle Financial Services Model Management and Governance Installer & Configuration (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.8-8.1.1
CVE-2021-2351 Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition User Interface (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.7, 8.0.8
CVE-2021-2351 Oracle FLEXCUBE Investor Servicing Infrastructure Code (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.4.0, 14.5.0
CVE-2021-2351 Oracle FLEXCUBE Private Banking Miscellaneous (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.0.0, 12.1.0
CVE-2020-11987 Oracle Banking APIs Framework (Apache Batik) HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 18.3, 19.1, 19.2, 20.1, 21.1
CVE-2020-11987 Oracle Banking Digital Experience Framework (Apache Batik) HTTP Yes 8.2 Network Low None None Un-

changed
High Low None 18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-22118 Oracle Financial Services Analytical Applications Infrastructure Others (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 8.0.8-8.1.1
CVE-2021-36090 Oracle Banking APIs Framework (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2020-25649 Oracle Banking APIs Framework (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-37137 Oracle Banking APIs Framework (Netty) Multiple Yes 7.5 Network Low None None Un-

changed
None None High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-36090 Oracle Banking Digital Experience Framework (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-37137 Oracle Banking Digital Experience Framework (Netty) Multiple Yes 7.5 Network Low None None Un-

changed
None None High 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-36090 Oracle Banking Enterprise Default Management Collections (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 2.7.0
CVE-2021-36090 Oracle Banking Party Management Web UI (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 2.7.0
CVE-2021-35043 Oracle Banking Enterprise Default Management Collections (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.7.0
CVE-2020-9281 Oracle Banking Enterprise Default Management Collections (CKEditor) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.7.0
CVE-2021-35043 Oracle Banking Party Management Web UI (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.7.0
CVE-2021-35043 Oracle Banking Platform SECURITY (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 2.7.0
CVE-2021-45105 Oracle Financial Services Analytical Applications Infrastructure Others (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 8.0.7-8.1.1 See Note 1
CVE-2021-45105 Oracle Financial Services Model Management and Governance Installer & Configuration (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 8.0.8, 8.1.0, 8.1.1 See Note 1
CVE-2021-41165 Oracle Banking APIs Framework (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-41165 Oracle Banking Digital Experience Framework (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-37695 Oracle Banking Party Management Web UI (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 2.7.0
CVE-2021-37695 Oracle Financial Services Analytical Applications Infrastructure Others (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 8.0.7-8.1.1
CVE-2021-28164 Oracle Banking APIs Framework (Apache Ignite) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 20.1, 21.1
CVE-2021-28164 Oracle Banking Digital Experience Framework (Apache Ignite) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 20.1, 21.1
CVE-2021-35687 Oracle Financial Services Analytical Applications Infrastructure Unified Metadata Manager HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.0.7-8.1.1
CVE-2021-29425 Oracle Banking APIs Framework (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-29425 Oracle Banking Digital Experience Framework (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 17.2, 18.1-18.3, 19.1, 19.2, 20.1, 21.1
CVE-2021-29425 Oracle Banking Enterprise Default Management Collections (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 2.3.0-2.4.1, 2.6.2, 2.7.1, 2.10.0, 2.12.0
CVE-2021-29425 Oracle Banking Party Management Web UI (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 2.7.0
CVE-2021-29425 Oracle Banking Platform Security (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 2.3.0-2.4.1, 2.6.2, 2.7.1
CVE-2021-29425 Oracle Financial Services Analytical Applications Infrastructure Others (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 8.0.7-8.1.1
CVE-2021-29425 Oracle Financial Services Model Management and Governance Installer & Configuration (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 8.0.8, 8.1.0, 8.1.1
CVE-2021-35686 Oracle Financial Services Analytical Applications Infrastructure Unified Metadata Manager HTTP No 4.3 Network Low Low None Un-

changed
Low None None 8.0.7-8.1.1

Notes:

  1. This patch also addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers need not apply the patches/mitigations of Security Alert CVE-2021-44228 and CVE-2021-45046 for this product.

Additional CVEs addressed are:

  • The patch for CVE-2021-28164 also addresses CVE-2021-28163.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • The patch for CVE-2021-37137 also addresses CVE-2021-37136.
  • The patch for CVE-2021-37695 also addresses CVE-2021-32808 and CVE-2021-32809.
  • The patch for CVE-2021-41165 also addresses CVE-2021-41164.

Oracle Food and Beverage Applications Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Food and Beverage Applications. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2019-10086 Oracle Hospitality Reporting and Analytics Reporting (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 9.1.0

Oracle Fusion Middleware Risk Matrix

This Critical Patch Update contains 39 new security patches for Oracle Fusion Middleware. 35 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update January 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2022 Patch Availability Document for Oracle Products, My Oracle Support Note 2817011.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-35587 Oracle Access Manager OpenSSO Agent HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.1.2.3.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2020-17530 Oracle Business Intelligence Enterprise Edition Installation (Apache Struts2) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21306 Oracle WebLogic Server Core T3 Yes 9.8 Network Low None None Un-

changed
High High High 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-40438 Oracle HTTP Server OSSL Module (Apache HTTP Server) HTTP Yes 9.0 Network High None None Changed High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-39154 Oracle Business Activity Monitoring Centralized Thirdparty Jars (XStream) HTTP No 8.5 Network High Low None Changed High High High 12.2.1.4.0
CVE-2021-2351 Oracle Data Integrator Runtime Java agent for ODI (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-2351 Oracle Enterprise Data Quality General (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-2351 Oracle Fusion Middleware Centralized Third-party Jars (JDBC, OCCI, ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.1.3.0, 12.2.1.4.0
CVE-2022-21346 Oracle BI Publisher BI Publisher Security HTTP Yes 7.5 Network Low None None Un-

changed
High None None 5.5.0.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2019-17566 Oracle Business Intelligence Enterprise Edition Analytics Web Answers (Apache Batik) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2021-36090 Oracle Business Process Management Suite Installer (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0
CVE-2021-4104 Oracle WebLogic Server Centralized Thirdparty Jars (Apache Log4j) HTTP No 7.5 Network High Low None Un-

changed
High High High 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21292 Oracle WebLogic Server Samples HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2.1.4.0, 14.1.1.0.0
CVE-2020-5258 Oracle WebLogic Server Samples (dojo) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21371 Oracle WebLogic Server Web Container HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-27568 Oracle WebLogic Server Web Services (json-smart) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-44832 Oracle WebLogic Server Centralized Thirdparty Jars (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 See Note 1
CVE-2022-21252 Oracle WebLogic Server Samples HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21347 Oracle WebLogic Server Core T3 Yes 6.5 Network Low None None Un-

changed
None Low Low 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21350 Oracle WebLogic Server Core T3 Yes 6.5 Network Low None None Un-

changed
None Low Low 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21353 Oracle WebLogic Server Core T3 Yes 6.5 Network Low None None Un-

changed
None Low Low 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2020-2934 Oracle WebLogic Server Datasource (MySQL Connector) SQL Yes 6.3 Network Low None Required Un-

changed
Low Low Low 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21361 Oracle WebLogic Server Sample apps HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2020-11023 Oracle WebLogic Server Sample apps (jQuery) HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21257 Oracle WebLogic Server Samples HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21258 Oracle WebLogic Server Samples HTTP Yes 6.1 Network Low None Required Changed Low Low None 14.1.1.0.0
CVE-2022-21259 Oracle WebLogic Server Samples HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21260 Oracle WebLogic Server Samples HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21261 Oracle WebLogic Server Samples HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21262 Oracle WebLogic Server Samples HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21386 Oracle WebLogic Server Web Container HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2019-10219 Oracle WebLogic Server Web Services (JBoss Enterprise Application Platform) HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-45105 Oracle Business Intelligence Enterprise Edition Analytics Server (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 5.5.0.0.0 See Note 1
CVE-2021-45105 Oracle Managed File Transfer MFT Runtime Server (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0 See Note 1
CVE-2021-45105 Oracle WebCenter Portal Security Framework (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 12.2.1.3.0, 12.2.1.4.0 See Note 1
CVE-2018-1324 Oracle WebLogic Server WLST (Apache Commons Compress) None No 5.5 Local Low None Required Un-

changed
None None High 14.1.1.0.0
CVE-2020-13956 Oracle WebLogic Server Samples (Apache HttpClient) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.2.1.4.0, 14.1.1.0.0
CVE-2021-29425 Oracle Fusion Middleware MapViewer Install (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.2.1.4.0
CVE-2021-29425 Oracle WebLogic Server Third Party Tools (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0

Notes:

  1. This patch also addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers need not apply the patches/mitigations of Security Alert CVE-2021-44228 and CVE-2021-45046 for this product.

Additional CVEs addressed are:

  • The patch for CVE-2018-1324 also addresses CVE-2018-11771.
  • The patch for CVE-2020-11023 also addresses CVE-2019-11358 and CVE-2020-11022.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • The patch for CVE-2021-39154 also addresses CVE-2021-29505, CVE-2021-39139, CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152 and CVE-2021-39153.
  • The patch for CVE-2021-4104 also addresses CVE-2022-23302, CVE-2022-23305 and CVE-2022-23307
  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Oracle Health Sciences Applications Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle Health Sciences Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Argus Analytics Schema Creation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.2.1, 8.2.2, 8.2.3
CVE-2021-2351 Oracle Argus Insight Schema Creation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.2.1, 8.2.2, 8.2.3
CVE-2021-2351 Oracle Argus Mart Schema Creation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.2.1, 8.2.2, 8.2.3
CVE-2021-2351 Oracle Argus Safety Schema Creation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.2.1, 8.2.2, 8.2.3
CVE-2021-2351 Oracle Clinical Schema Creation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 5.2.1, 5.2.2
CVE-2021-2351 Oracle Health Sciences Clinical Development Analytics Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 4.0.1
CVE-2021-2351 Oracle Health Sciences InForm CRF Submit Installation and Configuration (JDBC, ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.2.1
CVE-2021-2351 Oracle Thesaurus Management System Report Generation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 5.2.3, 5.3.0, 5.3.1

Oracle HealthCare Applications Risk Matrix

This Critical Patch Update contains 4 new security patches for Oracle HealthCare Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Health Sciences Information Manager Health Policy Engine (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 3.0.2, 3.0.3
CVE-2021-2351 Oracle Healthcare Data Repository Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 7.0.2, 8.1.0, 8.1.1
CVE-2021-2351 Oracle Healthcare Foundation Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 7.3.0.0-7.3.0.2, 8.0.0-8.0.2, 8.1.0-8.1.1
CVE-2021-2351 Oracle Healthcare Translational Research Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 4.1.0

Oracle Hospitality Applications Risk Matrix

This Critical Patch Update contains 3 new security patches for Oracle Hospitality Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Hospitality OPERA 5 Integrations (JDBC, ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 5.6
CVE-2021-2351 Oracle Hospitality Suite8 Rest API (ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.10.2, 8.11.0, 8.12.0, 8.13.0, 8.14.0
CVE-2021-42340 Oracle Hospitality Cruise Shipboard Property Management System Next-Gen SPMS (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 20.1.0

Additional CVEs addressed are:

  • The patch for CVE-2021-42340 also addresses CVE-2021-30640 and CVE-2021-33037.

Oracle Hyperion Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Hyperion. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Hyperion Infrastructure Technology Installation and Configuration (JDBC, OCCI, ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 11.2.7.0

Oracle iLearning Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle iLearning. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle iLearning Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.2, 6.3

Oracle Insurance Applications Risk Matrix

This Critical Patch Update contains 7 new security patches for Oracle Insurance Applications. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-10683 Oracle Insurance Policy Administration J2EE Architecture (dom4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 10.2.0, 10.2.4, 11.0.2, 11.1.0-11.3.0
CVE-2020-10683 Oracle Insurance Rules Palette Architecture (dom4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 10.2.0, 10.2.4, 11.0.2, 11.1.0-11.3.0
CVE-2021-2351 Oracle Insurance Data Gateway Security (JDBC) HTTP Yes 8.3 Network High None Required Changed High High High 11.0.2, 11.1.0, 11.2.7, 11.3.0, 11.3.1
CVE-2021-2351 Oracle Insurance Insbridge Rating and Underwriting Framework Administrator IBFA (JDBC, ODP for .NET) Oracle Net Yes 8.3 Network High None Required Changed High High High 5.2.0, 5.4.0-5.6.0
CVE-2021-2351 Oracle Insurance Policy Administration Architecture (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 11.0.2, 11.1.0, 11.2.7, 11.3.0, 11.3.1
CVE-2021-2351 Oracle Insurance Rules Palette Architecture (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 11.0.2, 11.1.0, 11.2.7, 11.3.0, 11.3.1
CVE-2021-22118 Oracle Insurance Rules Palette Architecture (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 11.0.2, 11.1.0, 11.2.7, 11.3.0, 11.3.1

Oracle Java SE Risk Matrix

This Critical Patch Update contains 18 new security patches for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-22959 Oracle GraalVM Enterprise Edition Node (Node.js) HTTP Yes 6.5 Network Low None None Un-

changed
Low Low None Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0
CVE-2022-21349 Oracle Java SE, Oracle GraalVM Enterprise Edition 2D Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21291 Oracle Java SE, Oracle GraalVM Enterprise Edition Hotspot Multiple Yes 5.3 Network Low None None Un-

changed
None Low None Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21305 Oracle Java SE, Oracle GraalVM Enterprise Edition Hotspot Multiple Yes 5.3 Network Low None None Un-

changed
None Low None Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21277 Oracle Java SE, Oracle GraalVM Enterprise Edition ImageIO Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21360 Oracle Java SE, Oracle GraalVM Enterprise Edition ImageIO Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21365 Oracle Java SE, Oracle GraalVM Enterprise Edition ImageIO Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21366 Oracle Java SE, Oracle GraalVM Enterprise Edition ImageIO Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21282 Oracle Java SE, Oracle GraalVM Enterprise Edition JAXP Multiple Yes 5.3 Network Low None None Un-

changed
Low None None Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21296 Oracle Java SE, Oracle GraalVM Enterprise Edition JAXP Multiple Yes 5.3 Network Low None None Un-

changed
Low None None Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21299 Oracle Java SE, Oracle GraalVM Enterprise Edition JAXP Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21271 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21283 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21293 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21294 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21340 Oracle Java SE, Oracle GraalVM Enterprise Edition Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21341 Oracle Java SE, Oracle GraalVM Enterprise Edition Serialization Multiple Yes 5.3 Network Low None None Un-

changed
None None Low Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1
CVE-2022-21248 Oracle Java SE, Oracle GraalVM Enterprise Edition Serialization Multiple Yes 3.7 Network High None None Un-

changed
None Low None Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4, 21.3.0 See Note 1

Notes:

  1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

Additional CVEs addressed are:

  • The patch for CVE-2021-22959 also addresses CVE-2021-22960.

Oracle JD Edwards Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle JD Edwards. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-23337 JD Edwards EnterpriseOne Tools E1 Dev Platform Tech – Cloud (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High Prior to 9.2.6.1

Additional CVEs addressed are:

  • The patch for CVE-2021-23337 also addresses CVE-2020-28500.

Oracle MySQL Risk Matrix

This Critical Patch Update contains 78 new security patches for Oracle MySQL. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-22946 MySQL Server Server: Compiling (cURL) Multiple Yes 7.5 Network Low None None Un-

changed
High None None 5.7.36 and prior, 8.0.27 and prior
CVE-2021-3712 MySQL Connectors Connector/C++ (OpenSSL) MySQL Protocol Yes 7.4 Network High None None Un-

changed
High None High 8.0.27 and prior
CVE-2021-3712 MySQL Connectors Connector/ODBC (OpenSSL) MySQL Protocol Yes 7.4 Network High None None Un-

changed
High None High 8.0.27 and prior
CVE-2022-21278 MySQL Server Server: Optimizer MySQL Protocol No 7.1 Network Low Low None Un-

changed
None Low High 8.0.26 and prior
CVE-2022-21351 MySQL Server Server: Optimizer MySQL Protocol No 7.1 Network Low Low None Un-

changed
None Low High 8.0.27 and prior
CVE-2022-21363 MySQL Connectors Connector/J MySQL Protocol No 6.6 Network High High None Un-

changed
High High High 8.0.27 and prior
CVE-2022-21358 MySQL Server Server: Security: Encryption MySQL Protocol No 6.5 Network Low Low None Un-

changed
None None High 8.0.27 and prior
CVE-2021-3634 MySQL Workbench Workbench: libssh MySQL Workbench No 6.5 Network Low Low None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21279 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21280 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21284 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21285 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21286 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21287 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21288 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21289 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21290 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 8.0.27 and prior
CVE-2022-21307 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21308 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 8.0.27 and prior
CVE-2022-21309 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21310 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21314 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21315 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21316 MySQL Cluster Cluster: General Multiple No 6.3 Local High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21318 MySQL Cluster Cluster: General Multiple No 6.3 Local High High Required Un-

changed
High High High 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21320 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 8.0.27 and prior
CVE-2022-21322 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 8.0.27 and prior
CVE-2022-21326 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21327 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21328 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21329 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21330 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21332 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21334 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 8.0.27 and prior
CVE-2022-21335 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21336 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21337 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21356 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21380 MySQL Cluster Cluster: General Multiple No 6.3 Adjacent

Network
High High Required Un-

changed
High High High 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21352 MySQL Server InnoDB MySQL Protocol No 5.9 Network High High None Un-

changed
None High High 8.0.26 and prior
CVE-2022-21367 MySQL Server Server: Compiling MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 5.7.36 and prior, 8.0.27 and prior
CVE-2022-21301 MySQL Server Server: DML MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.27 and prior
CVE-2022-21378 MySQL Server Server: Optimizer MySQL Protocol No 5.5 Network Low High None Un-

changed
None Low High 8.0.27 and prior
CVE-2022-21302 MySQL Server InnoDB MySQL Protocol No 5.3 Network High Low None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21254 MySQL Server Server: Optimizer MySQL Protocol No 5.3 Network High Low None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21348 MySQL Server InnoDB MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21270 MySQL Server Server: Federated MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.36 and prior, 8.0.27 and prior
CVE-2022-21256 MySQL Server Server: Group Replication Plugin MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21379 MySQL Server Server: Group Replication Plugin MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21362 MySQL Server Server: Information Schema MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21374 MySQL Server Server: Information Schema MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21253 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21264 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21297 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.26 and prior
CVE-2022-21339 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21342 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21370 MySQL Server Server: Optimizer MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 8.0.27 and prior
CVE-2022-21304 MySQL Server Server: Parser MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.36 and prior, 8.0.27 and prior
CVE-2022-21344 MySQL Server Server: Replication MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.36 and prior, 8.0.27 and prior
CVE-2022-21303 MySQL Server Server: Stored Procedure MySQL Protocol No 4.9 Network Low High None Un-

changed
None None High 5.7.36 and prior, 8.0.27 and prior
CVE-2022-21368 MySQL Server Server: Components Services MySQL Protocol No 4.7 Network Low High None Un-

changed
Low Low Low 8.0.27 and prior
CVE-2022-21245 MySQL Server Server: Security: Privileges MySQL Protocol No 4.3 Network Low Low None Un-

changed
None Low None 5.7.36 and prior, 8.0.27 and prior
CVE-2022-21265 MySQL Server Server: Optimizer MySQL Protocol No 3.8 Network Low High None Un-

changed
None Low Low 8.0.27 and prior
CVE-2022-21311 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21312 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21313 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21317 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21319 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21321 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21323 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21324 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21325 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21331 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21333 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21355 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21357 MySQL Cluster Cluster: General Multiple No 2.9 Adjacent

Network
High High Required Un-

changed
Low None Low 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior
CVE-2022-21249 MySQL Server Server: DDL MySQL Protocol No 2.7 Network Low High None Un-

changed
None None Low 8.0.27 and prior
CVE-2022-21372 MySQL Server Server: Security: Encryption MySQL Protocol No 2.7 Network Low High None Un-

changed
None None Low 8.0.27 and prior

Additional CVEs addressed are:

  • The patch for CVE-2021-22946 also addresses CVE-2021-22947.
  • The patch for CVE-2021-3712 also addresses CVE-2021-3711.

Oracle PeopleSoft Risk Matrix

This Critical Patch Update contains 13 new security patches for Oracle PeopleSoft. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-22931 PeopleSoft Enterprise PeopleTools Elastic Search (Node.js) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.57, 8.58, 8.59
CVE-2021-2351 PeopleSoft Enterprise PeopleTools Change Impact Analyzer (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.57, 8.58, 8.59
CVE-2022-21300 PeopleSoft Enterprise CS SA Integration Pack Snapshot Integration HTTP Yes 7.5 Network Low None None Un-

changed
High None None 9.0, 9.2
CVE-2021-37137 PeopleSoft Enterprise PeopleTools Elastic Search (Netty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.57, 8.58, 8.59
CVE-2021-22946 PeopleSoft Enterprise PeopleTools File Processing (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.57, 8.58, 8.59
CVE-2021-3712 PeopleSoft Enterprise PeopleTools Security (OpenSSL) Multiple Yes 7.4 Network High None None Un-

changed
High None High 8.57, 8.58, 8.59
CVE-2021-23337 PeopleSoft Enterprise PeopleTools Elastic Search (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 8.58, 8.59
CVE-2022-21345 PeopleSoft Enterprise PeopleTools Security HTTP No 6.5 Network Low Low None Un-

changed
High None None 8.58, 8.59
CVE-2022-21359 PeopleSoft Enterprise PeopleTools Optimization Framework HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.57, 8.58, 8.59
CVE-2022-21272 PeopleSoft Enterprise PeopleTools Portal HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.57, 8.58, 8.59
CVE-2022-21369 PeopleSoft Enterprise PeopleTools Rich Text Editor HTTP Yes 6.1 Network Low None Required Changed Low Low None 8.57, 8.58, 8.59
CVE-2021-37695 PeopleSoft Enterprise PeopleTools Rich Text Editor (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 8.57, 8.58, 8.59
CVE-2022-21364 PeopleSoft Enterprise PeopleTools Weblogic HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.57, 8.58, 8.59

Additional CVEs addressed are:

  • The patch for CVE-2021-22931 also addresses CVE-2021-22939 and CVE-2021-22940.
  • The patch for CVE-2021-22946 also addresses CVE-2021-22924, CVE-2021-22925, CVE-2021-22926 and CVE-2021-22947.
  • The patch for CVE-2021-23337 also addresses CVE-2020-28500 and CVE-2020-8203.
  • The patch for CVE-2021-3712 also addresses CVE-2021-3711.
  • The patch for CVE-2021-37137 also addresses CVE-2021-37136.
  • The patch for CVE-2021-37695 also addresses CVE-2021-32808 and CVE-2021-32809.

Oracle Policy Automation Risk Matrix

This Critical Patch Update contains 1 new security patch for Oracle Policy Automation. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Policy Automation Determinations Engine (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.0-12.2.24

Oracle Retail Applications Risk Matrix

This Critical Patch Update contains 43 new security patches for Oracle Retail Applications. 34 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-13936 Oracle Retail Integration Bus RIB Kernal (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 19.0.1
CVE-2020-13936 Oracle Retail Order Broker Order Broker Foundation (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 16.0
CVE-2020-13936 Oracle Retail Service Backbone RSB kernel (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 19.0.1
CVE-2021-2351 Oracle Retail Analytics Other (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 16.0.0-16.0.2
CVE-2021-2351 Oracle Retail Assortment Planning Application Core (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 16.0.3
CVE-2021-2351 Oracle Retail Back Office Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1
CVE-2021-2351 Oracle Retail Central Office Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1
CVE-2021-2351 Oracle Retail Customer Insights Other (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 16.0.0-16.0.2
CVE-2021-2351 Oracle Retail Extract Transform and Load Mathematical Operators (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 13.2.8
CVE-2021-2351 Oracle Retail Financial Integration PeopleSoft Integration Bugs (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-2351 Oracle Retail Integration Bus RIB Kernal (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-2351 Oracle Retail Merchandising System Foundation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 19.0.1
CVE-2021-2351 Oracle Retail Order Broker System Administration (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 16.0, 18.0, 19.1
CVE-2021-2351 Oracle Retail Order Management System Upgrade Install (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 19.5
CVE-2021-2351 Oracle Retail Point-of-Service Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1
CVE-2021-2351 Oracle Retail Predictive Application Server RPAS Server (OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1.3, 15.0.3, 16.0.3
CVE-2021-2351 Oracle Retail Price Management Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1, 15, 16
CVE-2021-2351 Oracle Retail Returns Management Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1
CVE-2021-2351 Oracle Retail Service Backbone RSB Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-2351 Oracle Retail Xstore Point of Service Xenvironment (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.0.4, 18.0.3, 19.0.2, 20.0.1
CVE-2021-22118 Oracle Retail Customer Management and Segmentation Foundation Deal (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 16.0-19.0
CVE-2021-4104 Oracle Retail Allocation General (Apache Log4j) HTTP No 7.5 Network High Low None Un-

changed
High High High 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-23337 Oracle Retail Customer Management and Segmentation Foundation Security (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 19.0
CVE-2021-44832 Oracle Retail Assortment Planning Application Core (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 16.0.3 See Note 1
CVE-2021-44832 Oracle Retail Fiscal Management NF Issuing (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 14.2 See Note 1
CVE-2021-45105 Oracle Retail Back Office Security (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1 See Note 1
CVE-2021-45105 Oracle Retail Central Office Security (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1 See Note 1
CVE-2021-45105 Oracle Retail EFTLink Installation (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 16.0.3, 17.0.2, 18.0.1, 19.0.1, 20.0.1 See Note 1
CVE-2021-45105 Oracle Retail Integration Bus RIB Kernal (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1.3.0, 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 See Note 1
CVE-2021-45105 Oracle Retail Invoice Matching Security (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 15.0.3, 16.0.3 See Note 1
CVE-2021-45105 Oracle Retail Order Broker System Administration (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 16.0, 18.0, 19.1 See Note 1
CVE-2021-45105 Oracle Retail Order Management System Upgrade Install (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 19.5 See Note 1
CVE-2021-45105 Oracle Retail Point-of-Service Administration (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1 See Note 1
CVE-2021-45105 Oracle Retail Predictive Application Server RPAS Server (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1.3.46, 15.0.3.115, 16.0.3.240 See Note 1
CVE-2021-45105 Oracle Retail Price Management Security (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 13.2, 14.0.4, 14.1.3, 15.0.3, 16.0.3 See Note 1
CVE-2021-45105 Oracle Retail Returns Management Security (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1 See Note 1
CVE-2021-45105 Oracle Retail Service Backbone RSB Installation (Apache Log4j) HTTP Yes 5.9 Network High None None Un-

changed
None None High 14.1.3.0, 14.1.3.2, 15.0.3.1, 16.0.1-16.0.3, 19.0.0, 19.0.1 See Note 1
CVE-2021-31812 Oracle Retail Customer Management and Segmentation Foundation Security (Apache PDFbox) None No 5.5 Local Low None Required Un-

changed
None None High 18.1
CVE-2021-29425 Oracle Retail Assortment Planning Application Core (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 16.0.3
CVE-2021-29425 Oracle Retail Integration Bus RIB Kernal (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 14.1.3.2, 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-29425 Oracle Retail Order Broker System Administration (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 16.0, 18.0, 19.1
CVE-2021-29425 Oracle Retail Service Backbone RSB Installation (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 15.0.3.1, 16.0.3, 19.0.1
CVE-2021-29425 Oracle Retail Size Profile Optimization Application Core (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 16.0.3

Notes:

  1. This patch also addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers need not apply the patches/mitigations of Security Alert CVE-2021-44228 and CVE-2021-45046 for this product.

Additional CVEs addressed are:

  • The patch for CVE-2021-23337 also addresses CVE-2020-28500.
  • The patch for CVE-2021-31812 also addresses CVE-2021-31811.

Oracle Siebel CRM Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Siebel CRM. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Siebel UI Framework EAI (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 21.12 and prior
CVE-2021-44832 Siebel UI Framework Enterprise Cache (Apache Log4j) HTTP No 6.6 Network High High None Un-

changed
High High High 21.12 and prior See Note 1

Notes:

  1. This patch also addresses vulnerabilities CVE-2021-44228 and CVE-2021-45046. Customers need not apply the patches/mitigations of Security Alert CVE-2021-44228 and CVE-2021-45046 for this product.

Additional CVEs addressed are:

  • The patch for CVE-2021-44832 also addresses CVE-2021-45105.

Oracle Supply Chain Risk Matrix

This Critical Patch Update contains 10 new security patches for Oracle Supply Chain. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-2351 Oracle Agile Engineering Data Management Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.2.1.0
CVE-2021-2351 Oracle Agile PLM Security (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 9.3.6
CVE-2021-2351 Oracle Demantra Demand Management Security (JDBC, OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.6-12.2.11
CVE-2021-2351 Oracle Product Lifecycle Analytics Installation (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 3.6.1
CVE-2021-2351 Oracle Rapid Planning Middle Tier (JDBC, OCCI) Oracle Net Yes 8.3 Network High None Required Changed High High High 12.2.6-12.2.11
CVE-2020-25649 Agile Product Lifecycle Management Integration Pack for Oracle E-Business Suite Installation Issues (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 3.6
CVE-2021-35043 Oracle Agile PLM Security (AntiSamy) HTTP Yes 6.1 Network Low None Required Changed Low Low None 9.3.3
CVE-2021-36374 Oracle Agile PLM Security (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 9.3.6
CVE-2020-17521 Oracle Agile PLM MCAD Connector CAX Client (Apache Groovy) None No 5.5 Local Low Low None Un-

changed
High None None 3.6, 3.4
CVE-2021-33037 Oracle Agile PLM Security (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 9.3.6

Additional CVEs addressed are:

  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.

Oracle Support Tools Risk Matrix

This Critical Patch Update contains 4 new security patches for Oracle Support Tools. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-27568 OSS Support Tools Diagnostic Assistant (json-smart) HTTP Yes 9.1 Network Low None None Un-

changed
High None High Prior to 2.12.42
CVE-2021-2351 OSS Support Tools Diagnostic Assistant (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High Prior to 2.12.42
CVE-2016-7103 OSS Support Tools Diagnostic Assistant (jQuery UI) HTTP Yes 6.1 Network Low None Required Changed Low Low None Prior to 2.12.42
CVE-2021-29425 OSS Support Tools Diagnostic Assistant (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None Prior to 2.12.42

Oracle Systems Risk Matrix

This Critical Patch Update contains 11 new security patches for Oracle Systems. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3517 Oracle ZFS Storage Appliance Kit Operating System Image Multiple Yes 8.6 Network Low None None Un-

changed
Low Low High 8.8
CVE-2021-2351 Oracle ZFS Storage Application Integration Engineering Software Snap Management Utility (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 1.3.3
CVE-2020-8285 Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers XCP Firmware (cURL) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to XCP2410, prior to XCP3110
CVE-2021-3326 Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers XCP Firmware (glibc) Multiple Yes 7.5 Network Low None None Un-

changed
None None High Prior to XCP2410, prior to XCP3110
CVE-2021-23840 Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers XCP Firmware (OpenSSL) TLS Yes 7.5 Network Low None None Un-

changed
None None High Prior to XCP2410, prior to XCP3110
CVE-2020-13817 Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers XCP Firmware (NTP) NTP Yes 7.4 Network High None None Un-

changed
None High High Prior to XCP2410, prior to XCP3110
CVE-2021-43395 Oracle Solaris Filesystem None No 6.5 Local Low Low None Changed None None High 11, 10
CVE-2022-21375 Oracle Solaris Kernel None No 5.5 Local Low Low None Un-

changed
None None High 11
CVE-2022-21271 Oracle Solaris Libraries Multiple Yes 5.3 Network Low None None Un-

changed
None None Low 11
CVE-2022-21263 Oracle Solaris Fault Management Architecture None No 4.8 Local Low Low Required Un-

changed
Low Low Low 11
CVE-2022-21298 Oracle Solaris Install None No 3.9 Local Low Low Required Un-

changed
None Low Low 11

Additional CVEs addressed are:

  • The patch for CVE-2020-8285 also addresses CVE-2020-8177 and CVE-2020-8284.
  • The patch for CVE-2021-3517 also addresses CVE-2021-3516, CVE-2021-3541 and CVE-2021-36690.

Oracle Utilities Applications Risk Matrix

This Critical Patch Update contains 13 new security patches for Oracle Utilities Applications. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2020-14756 Oracle Utilities Framework General (Oracle Coherence) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0
CVE-2021-27568 Oracle Utilities Framework Common (json-smart) HTTP Yes 9.1 Network Low None None Un-

changed
High None High 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0
CVE-2021-39139 Oracle Utilities Framework General (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0
CVE-2020-13936 Oracle Utilities Testing Accelerator Tools (Apache Velocity Engine) HTTP No 8.8 Network Low Low None Un-

changed
High High High 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1
CVE-2021-39139 Oracle Utilities Testing Accelerator Tools (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 6.0.0.1.1
CVE-2021-2351 Oracle Utilities Framework General (JDBC) HTTP Yes 8.3 Network High None Required Changed High High High 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0
CVE-2021-2351 Oracle Utilities Testing Accelerator Tools (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1
CVE-2021-22118 Oracle Utilities Testing Accelerator Tools (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1
CVE-2021-36090 Oracle Utilities Testing Accelerator Tools (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1
CVE-2021-4104 Oracle Utilities Testing Accelerator Tools (Apache Log4j) HTTP No 7.5 Network High Low None Un-

changed
High High High 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1
CVE-2021-36374 Oracle Utilities Testing Accelerator Tools (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 6.0.0.1.1
CVE-2021-33037 Oracle Utilities Testing Accelerator Tools (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 6.0.0.1.1, 6.0.0.2.2, 6.0.0.3.1
CVE-2021-29425 Oracle Utilities Testing Accelerator Tools (Apache Commons IO) HTTP Yes 4.8 Network High None None Un-

changed
Low Low None 6.0.0.1.1

Additional CVEs addressed are:

  • The patch for CVE-2020-14756 also addresses CVE-2020-14642, CVE-2021-2277, CVE-2021-2344, CVE-2021-2371 and CVE-2021-2428.
  • The patch for CVE-2021-27568 also addresses CVE-2021-31684.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.
  • The patch for CVE-2021-39139 also addresses CVE-2021-39140, CVE-2021-39141, CVE-2021-39144, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39150, CVE-2021-39151, CVE-2021-39152, CVE-2021-39153 and CVE-2021-39154.

Oracle Virtualization Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Virtualization. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2022-21394 Oracle VM VirtualBox Core None No 6.5 Local Low Low None Changed High None None Prior to 6.1.32 See Note 1
CVE-2022-21295 Oracle VM VirtualBox Core None No 3.8 Local Low Low None Changed Low None None Prior to 6.1.32

Notes:

  1. This vulnerability applies to Windows systems only.

Related:

  • No Related Posts

Oracle Security Alert for CVE-2021-44228 – 10 December 2021

Oracle Security Alert Advisory – CVE-2021-44228

Description

This Security Alert addresses CVE-2021-44228, a remote code execution vulnerability in Apache Log4j. It is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. It also addresses CVE-2021-45046, which arose as an incomplete fix by Apache to CVE-2021-44228.

Due to the severity of this vulnerability and the publication of exploit code on various sites, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.

Affected Products and Patch Information

Security vulnerabilities addressed by this Security Alert affect the product listed below. The product area is shown in the Patch Availability Document column.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Apache Log4j, versions 2.0-2.15.0 My Oracle Support Document

Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Security Alert program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Security Alert. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

References

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Security Alert. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product’s risk matrix.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Security Alert to Oracle: None credited in this Security Alert.

Modification History

Date Note
2021-December-17 Rev 3. Updated CVSS score for CVE-2021-45046
2021-December-15 Rev 2. Added CVE-2021-45046
2021-December-10 Rev 1. Initial Release

Third Party Component Risk Matrix

This Security Alert contains 2 new security patches for Third Party Component. Both of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-44228 Apache Log4j All Multiple Yes 10.0 Network Low None None Changed High High High 2.0 – 2.14.1
CVE-2021-45046 Apache Log4j All Multiple Yes 9.0 Network High None None Changed High High High 2.0 – 2.15.0

Related:

  • No Related Posts

Oracle Critical Patch Update Advisory – October 2021

Oracle Critical Patch Update Advisory – October 2021

Description

A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.

Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.

This Critical Patch Update contains 419 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at October 2021 Critical Patch Update: Executive Summary and Analysis.

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.

Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 Enterprise Manager
Enterprise Manager for Oracle Database, version 13.4.0.0 Enterprise Manager
Enterprise Manager Ops Center, version 12.4.0.0 Enterprise Manager
Essbase Administration Services, versions prior to 11.1.2.4.046, prior to 21.3, Database
Hyperion Financial Management, versions 11.1.2.4, 11.2.6.0 Fusion Middleware
Hyperion Financial Reporting, versions 11.1.2.4, 11.2.6.0 Fusion Middleware
Hyperion Infrastructure Technology, version 11.2.6.0 Fusion Middleware
Hyperion Planning, versions 11.1.2.4, 11.2.6.0 Fusion Middleware
Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3 Oracle Construction and Engineering Suite
JD Edwards EnterpriseOne Orchestrator, versions prior to 9.2.6.0 JD Edwards
JD Edwards EnterpriseOne Tools, versions prior to 9.2.6.0 JD Edwards
JD Edwards World Security, version A9.4 JD Edwards
MySQL Client, versions 8.0.26 and prior MySQL
MySQL Cluster, versions 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior, 8.0.26 and prior MySQL
MySQL Connectors, versions 8.0.26 and prior MySQL
MySQL Enterprise Monitor, versions 8.0.25 and prior MySQL
MySQL Server, versions 5.7.35 and prior, 8.0.26 and prior MySQL
MySQL Workbench, versions 8.0.26 and prior MySQL
Oracle Agile PLM, versions 9.3.3, 9.3.6 Oracle Supply Chain Products
Oracle Application Express, versions prior to 21.1.0 Database
Oracle Application Testing Suite, version 13.3.0.1 Enterprise Manager
Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2 Oracle Supply Chain Products
Oracle Banking Cash Management, versions 14.2, 14.3, 14.5 Contact Support
Oracle Banking Corporate Lending Process Management, versions 14.2, 14.3, 14.5 Contact Support
Oracle Banking Credit Facilities Process Management, versions 14.2, 14.3, 14.5 Contact Support
Oracle Banking Enterprise Default Management, versions 2.10.0, 2.12.0 Oracle Banking Platform
Oracle Banking Extensibility Workbench, versions 14.2, 14.3, 14.5 Contact Support
Oracle Banking Platform, versions 2.6.2, 2.7.1, 2.9.0, 2.12.0 Oracle Banking Platform
Oracle Banking Supply Chain Finance, versions 14.2, 14.3, 14.5 Contact Support
Oracle Banking Trade Finance Process Management, versions 14.2, 14.3, 14.5 Contact Support
Oracle Banking Virtual Account Management, versions 14.2, 14.3, 14.5 Contact Support
Oracle Business Activity Monitoring, versions 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Business Intelligence Enterprise Edition, versions 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Commerce Guided Search, version 11.3.2 Oracle Commerce
Oracle Commerce Merchandising, version 11.3.2 Oracle Commerce
Oracle Communications Application Session Controller, version 3.9 Oracle Communications Application Session Controller
Oracle Communications Billing and Revenue Management, versions 7.5.0.0.0, 12.0.0.3.0 Oracle Communications Billing and Revenue Management
Oracle Communications BRM – Elastic Charging Engine, version 12.0.0.3 Oracle Communications BRM – Elastic Charging Engine
Oracle Communications Calendar Server, version 8.0.0.6.0 Oracle Communications Calendar Server
Oracle Communications Cloud Native Core Network Repository Function, version 1.14.0 Oracle Communications Cloud Native Core Network Repository Function
Oracle Communications Cloud Native Core Policy, version 1.11.0 Communications Cloud Native Core Policy
Oracle Communications Control Plane Monitor, versions 3.4, 4.2, 4.3, 4.4 Oracle Communications Control Plane Monitor
Oracle Communications Converged Application Server – Service Controller, version 6.2 Oracle Communications Converged Application Server – Service Controller
Oracle Communications Design Studio, version 7.4.2 Oracle Communications Design Studio
Oracle Communications Diameter Signaling Router, versions 8.0.0.0-8.5.0.0 Oracle Communications Diameter Signaling Router
Oracle Communications EAGLE Oracle Communications EAGLE
Oracle Communications EAGLE FTP Table Base Retrieval, version 4.5 Oracle Communications EAGLE FTP Table Base Retrieval
Oracle Communications EAGLE LNP Application Processor, versions 46.7, 46.8, 46.9 Oracle Communications EAGLE LNP Application Processor
Oracle Communications Element Manager, versions 8.2.0.0-8.2.4.0 Oracle Communications Element Manager
Oracle Communications Fraud Monitor, versions 3.4-4.4 Oracle Communications Fraud Monitor
Oracle Communications Interactive Session Recorder, version 6.4 Oracle Communications Interactive Session Recorder
Oracle Communications LSMS, versions 13.1-13.4 Oracle Communications LSMS
Oracle Communications Messaging Server, version 8.1 Oracle Communications Messaging Server
Oracle Communications MetaSolv Solution, version 6.3.1 Oracle Communications MetaSolv Solution
Oracle Communications Offline Mediation Controller, version 12.0.0.3.0 Oracle Communications Offline Mediation Controller
Oracle Communications Operations Monitor, versions 3.4, 4.2, 4.3, 4.4 Oracle Communications Operations Monitor
Oracle Communications Policy Management, version 12.5.0 Oracle Communications Policy Management
Oracle Communications Pricing Design Center, version 12.0.0.3.0 Oracle Communications Pricing Design Center
Oracle Communications Services Gatekeeper, version 7.0 Oracle Communications Services Gatekeeper
Oracle Communications Session Border Controller, versions 8.4, 9.0 Oracle Communications Session Border Controller
Oracle Communications Session Report Manager, versions 8.0.0.0-8.2.5.0 Oracle Communications Session Report Manager
Oracle Communications Session Route Manager, versions 8.0.0.0-8.2.5.0 Oracle Communications Session Route Manager
Oracle Data Integrator, version 12.2.1.4.0 Fusion Middleware
Oracle Database Server, versions 12.1.0.2, 12.2.0.1, 19c, 21c Database
Oracle Documaker, versions 12.6.0-12.6.4 Oracle Insurance Applications
Oracle E-Business Suite, versions 12.1.1-12.1.3, 12.2.3-12.2.10 Oracle E-Business Suite
Oracle Enterprise Communications Broker, versions 3.2, 3.3 Oracle Enterprise Communications Broker
Oracle Enterprise Repository, version 11.1.1.7.0 Fusion Middleware
Oracle Enterprise Telephony Fraud Monitor, versions 3.4, 4.2, 4.3, 4.4 Oracle Enterprise Telephony Fraud Monitor
Oracle Ethernet Switch ES2-64, Oracle Ethernet Switch ES2-72, version 2.0.0.14 Systems
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.6-8.1.1 Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Enterprise Case Management, versions 8.0.7.2.0, 8.0.8.1.0 Oracle Financial Services Enterprise Case Management
Oracle Financial Services Model Management and Governance, versions 8.0.8.0.0-8.1.0.0.0 Oracle Financial Services Model Management and Governance
Oracle FLEXCUBE Core Banking, versions 11.7, 11.8, 11.9, 11.10 Contact Support
Oracle Global Lifecycle Management OPatch Global Lifecycle Management
Oracle GoldenGate, versions prior to 19.1.0.0.0.210420 Database
Oracle GoldenGate Application Adapters, version 19.1.0.0.0 Fusion Middleware
Oracle GraalVM Enterprise Edition, versions 20.3.3, 21.2.0 Java SE
Oracle Graph Server and Client, versions prior to 21.3.0 Database
Oracle Health Sciences Central Coding, versions 6.2.0, 6.3.0 Health Sciences
Oracle Health Sciences InForm, version 6.3.0 Health Sciences
Oracle Healthcare Data Repository, versions 7.0.2, 8.1.0 Health Sciences
Oracle Healthcare Foundation, versions 7.3, 8.0, 8.1 Health Sciences
Oracle Hospitality Cruise Shipboard Property Management System, version 20.1.0 Oracle Hospitality Cruise Shipboard Property Management System
Oracle HTTP Server, versions 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle Insurance Calculation Engine, versions 11.0.0-11.3.1 Oracle Insurance Applications
Oracle Insurance Policy Administration, versions 11.0.0-11.3.1 Oracle Insurance Applications
Oracle Java SE, versions 7u311, 8u301, 11.0.12, 17 Java SE
Oracle NoSQL Database NoSQL Database
Oracle Outside In Technology, version 8.5.5 Fusion Middleware
Oracle Real User Experience Insight, versions 13.4.1.0, 13.5.1.0 Enterprise Manager
Oracle Real-Time Decision Server, versions 3.2.0.0, 11.1.1.9.0 Fusion Middleware
Oracle REST Data Services, versions prior to 21.3 Database
Oracle Retail Advanced Inventory Planning, versions 14.1, 15.0, 16.0 Retail Applications
Oracle Retail Assortment Planning, version 16.0 Retail Applications
Oracle Retail Back Office, versions 14.0, 14.1 Retail Applications
Oracle Retail Bulk Data Integration, versions 16.0.3, 19.0.1 Retail Applications
Oracle Retail Central Office, versions 14.0, 14.1 Retail Applications
Oracle Retail Customer Management and Segmentation Foundation, versions 16.0-19.0 Retail Applications
Oracle Retail Extract Transform and Load, version 13.2.8 Retail Applications
Oracle Retail Financial Integration, versions 14.1.3.2, 15.0.4.0, 16.0.3.0 Retail Applications
Oracle Retail Integration Bus, versions 14.1.3.2, 15.0.4.0, 16.0.3.0, 19.0.1.0 Retail Applications
Oracle Retail Merchandising System, versions 15.0.3, 19.0.1 Retail Applications
Oracle Retail Point-of-Service, versions 14.0, 14.1 Retail Applications
Oracle Retail Predictive Application Server, versions 14.1.3, 15.0.3, 16.0.3 Retail Applications
Oracle Retail Returns Management, versions 14.0, 14.1 Retail Applications
Oracle Retail Service Backbone, versions 14.1.3.2, 15.0.4.0, 16.0.3.0, 19.0.1.0 Retail Applications
Oracle Retail Store Inventory Management, versions 14.1, 15.0, 16.0 Retail Applications
Oracle Secure Backup, versions prior to 18.1.0.1.0 Oracle Secure Backup
Oracle Secure Global Desktop, version 5.6 Virtualization
Oracle Solaris, version 11 Systems
Oracle Spatial Studio Database
Oracle SQL Developer Database
Oracle Transportation Management, version 6.4.3 Oracle Supply Chain Products
Oracle Utilities Framework, versions 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0-4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0 Oracle Utilities Applications
Oracle VM VirtualBox, versions prior to 6.1.28 Virtualization
Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebCenter Sites, versions 12.2.1.3.0, 12.2.1.4.0 Fusion Middleware
Oracle WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 Fusion Middleware
Oracle ZFS Storage Appliance Kit, version 8.8 Systems
PeopleSoft Enterprise CC Common Application Objects, version 9.2 PeopleSoft
PeopleSoft Enterprise CS Academic Advisement, version 9.2 PeopleSoft
PeopleSoft Enterprise CS Campus Community, versions 9.0, 9.2 PeopleSoft
PeopleSoft Enterprise CS SA Integration Pack, versions 9.0, 9.2 PeopleSoft
PeopleSoft Enterprise CS Student Records, version 9.2 PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.57, 8.58, 8.59 PeopleSoft
PeopleSoft Enterprise SCM, version 9.2 PeopleSoft
Primavera Gateway, versions 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7 Oracle Construction and Engineering Suite
Primavera Unifier, versions 17.7-17.12, 18.8, 19.12, 20.12 Oracle Construction and Engineering Suite
Siebel Applications, versions 21.9 and prior Siebel
Tekelec Platform Distribution, versions 7.4.0-7.7.1 Tekelec Platform Distribution
Tekelec Virtual Operating Environment, versions 3.4.0-3.7.1 Tekelec Virtual Operating Environment

Note:

  • Vulnerabilities affecting either Oracle Database or Oracle Fusion Middleware may affect Oracle Fusion Applications, so Oracle customers should refer to Oracle Fusion Applications Critical Patch Update Knowledge Document, My Oracle Support Note 1967316.1 for information on patches to be applied to Fusion Application environments.
  • Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document, My Oracle Support Note 2160904.1 for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
  • Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris 10 customers should refer to the latest patch-sets which contain critical security fixes and detailed in Systems Patch Availability Document. Please see Reference Index of CVE IDs and Solaris Patches (My Oracle Support Note 1448883.1) for more information.
  • Users running Java SE with a browser can download the latest release from https://java.com. Users on the Windows and Mac OS X platforms can also use automatic updates to get the latest release.

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.

Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE# which is its unique identifier. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices. A CVE# shown in italics indicates that this vulnerability impacts a different product, but also has impact on the product where the italicized CVE# is listed.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.

Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product’s risk matrix.

The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.

Workarounds

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Skipped Critical Patch Updates

Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.

Critical Patch Update Supported Products and Versions

Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.

Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.

Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in My Oracle Support Note 209768.1. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.

Credit Statement

The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:

  • 0xfoxone: CVE-2021-35572, CVE-2021-35573, CVE-2021-35574, CVE-2021-35656, CVE-2021-35657, CVE-2021-35658, CVE-2021-35661, CVE-2021-35662
  • Andrej Simko of Accenture: CVE-2021-35580, CVE-2021-35581, CVE-2021-35582
  • Anonymous researcher working with Trend Micro’s Zero Day Initiative: CVE-2021-35590, CVE-2021-35592, CVE-2021-35593, CVE-2021-35594, CVE-2021-35598, CVE-2021-35621
  • Artem Smotrakov: CVE-2021-35603
  • Asaf Greenholts of Bank Hapoalim: CVE-2021-35550
  • Aveek Biswas of Salesforce.com: CVE-2021-27290, CVE-2021-32804
  • Black Lantern Security LLC: CVE-2021-35665
  • Chuck Hunley of sas.com: CVE-2021-35567
  • DoHyun Lee (l33d0hyun) of VirtualBoBs: CVE-2021-35540
  • Eddie Zhu of Beijing DBSEC Technology Co., Ltd: CVE-2021-2332
  • Emad Al-Mousa: CVE-2021-35576
  • Girlelecta: CVE-2021-35659, CVE-2021-35660
  • Guillaume Jacques of synacktiv: CVE-2021-35651, CVE-2021-35652, CVE-2021-35653, CVE-2021-35654, CVE-2021-35655
  • Hongkun Chen of Alibaba: CVE-2021-2471
  • Jie Liang of WingTecher Lab of Tsinghua University: CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645
  • Jingzhou Fu of WingTecher Lab of Tsinghua University: CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645
  • John Simpson of Trend Micro Security Research working with the Zero Day Initiative: CVE-2021-35611
  • Kosong: CVE-2021-2461
  • Lai Han of NSFocus Security Team: CVE-2021-35620
  • Liboheng of Tophant Starlight laboratory: CVE-2021-35617
  • Markus Loewe: CVE-2021-35561
  • Matthias Kaiser of Apple Information Security: CVE-2021-2137
  • Ofir Hamam: CVE-2021-2476, CVE-2021-35616
  • Paul Barbé of synacktiv: CVE-2021-35651, CVE-2021-35652, CVE-2021-35653, CVE-2021-35654, CVE-2021-35655
  • Qiguang Zhu: CVE-2021-35551
  • Qiuhao Li: CVE-2021-2475
  • Ryan Emmons: CVE-2021-35538
  • Sven Woynoski of it.sec GmbH: CVE-2021-2414, CVE-2021-2416
  • Théo Louis-Tisserand of synacktiv: CVE-2021-35651, CVE-2021-35652, CVE-2021-35653, CVE-2021-35654, CVE-2021-35655
  • Tristen Hayfield of Cisco: CVE-2021-35565
  • Victor Rodriguez: CVE-2021-35595
  • Xu Yuanzhen of Alibaba Cloud Security Team: CVE-2021-2471
  • Yaoguang Chen of Ant Security Light-Year Lab: CVE-2021-35557, CVE-2021-35558, CVE-2021-35634, CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645
  • Yi Ren of Alibaba: CVE-2021-35542
  • Zhiyong Wu of WingTecher Lab of Tsinghua University: CVE-2021-35641, CVE-2021-35642, CVE-2021-35643, CVE-2021-35644, CVE-2021-35645

Security-In-Depth Contributors

Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.

In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle’s Security-In-Depth program:

  • Alexander Kornbrust of Red Database Security [2 reports]
  • Andrej Simko of Accenture
  • Emad Al-Mousa
  • Fabian Meumertzheim of Code Intelligence
  • Hinemos Development Team, NTT DATA INTELLILINK Corporation working with Red Hat
  • Juho Nurminen of Mattermost
  • Masafumi Miura of Red Hat
  • Paul Fiterau Brostean of Uppsala University [3 reports]
  • Yoshikazu Nojima of Red Hat

On-Line Presence Security Contributors

Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle’s on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle’s on-line external-facing systems.

For this quarter, Oracle recognizes the following for contributions to Oracle’s On-Line Presence Security program:

  • Adarsh VS Mannarakkal
  • Ali Alzahrani
  • Anil Bhatt
  • Aravindha Hariharan
  • Black Lantern Security LLC [8 reports]
  • Brahim Ait Boufakri
  • Dara Greaney
  • Gaurang Maheta of gaurang maheta
  • Gil Hoffer
  • H01 from FPT Software Cybersecurity Assurance Service
  • Jebarson Immanuel
  • Khalid matar Alharthi
  • Lidor Ben Shitrit from Orca Security
  • Mahad Ali
  • Maxime Bonillo
  • Nic Palmer (Optimus Crime)
  • Omri Litvak
  • Osama Mohammed
  • PhishLabs Security Operations
  • Priyanshu Kumawat
  • PwnWiki Administrator of PwnWiki
  • Sergiy Kornienko
  • Seth Duda of SquareWorks Consulting
  • Shuvam Adhikari
  • Vaishnav Pardhi
  • Vismit Sudhir Rakhecha (Druk) [2 reports]

Critical Patch Update Schedule

Critical Patch Updates are released on the Tuesday closest to the 17th day of January, April, July and October. The next four dates are:

  • 18 January 2022
  • 19 April 2022
  • 19 July 2022
  • 18 October 2022

References

Modification History

Date Note
2022-January-18 Rev 3. Updated the essbase affected versions
2021-October-28 Rev 2. Changed the product of CVE-2018-20843 from Oracle WebLogic Server Proxy Plug-In to Oracle HTTP Server and added 5.9.0.0.0 to affected versions of Oracle Business Intelligence Enterprise Edition.
2021-October-19 Rev 1. Initial Release.

Oracle Database Products Risk Matrices

This Critical Patch Update contains 18 new security patches for Oracle Database Products divided as follows:

  • 9 new security patches for Oracle Database Products
  • 5 new security patches for Oracle Essbase
  • No new security patches for Oracle Global Lifecycle Management, but third party patches are provided
  • 1 new security patch for Oracle GoldenGate
  • 1 new security patch for Oracle Graph Server and Client
  • No new security patches for Oracle NoSQL Database, but third party patches are provided
  • 1 new security patch for Oracle REST Data Services
  • 1 new security patch for Oracle Secure Backup
  • No new security patches for Oracle Spatial Studio, but third party patches are provided
  • No new security patches for Oracle SQL Developer, but third party patches are provided

Oracle Database Server Risk Matrix

This Critical Patch Update contains 9 new security patches plus additional third party patches noted below for Oracle Database Products. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.

CVE# Component Package and/or Privilege Required Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-35599 Zero Downtime DB Migration to Cloud Local Logon Local Logon No 8.2 Local Low High None Changed High High High 21c
CVE-2021-25122 Oracle Database Enterprise Edition (Apache Tomcat) None HTTP Yes 7.5 Network Low None None Un-

changed
High None None 12.2.0.1, 19c, 21c
CVE-2021-35619 Java VM Create Procedure Oracle Net No 7.1 Network High Low Required Un-

changed
High High High 12.1.0.2, 12.2.0.1, 19c, 21c
CVE-2021-2332 Oracle LogMiner DBA Oracle Net No 6.7 Network Low High None Un-

changed
Low High High 12.1.0.2, 12.2.0.1, 19c
CVE-2021-35551 RDBMS Security DBA Oracle Net No 5.5 Network Low High None Un-

changed
None Low High 12.2.0.1, 19c, 21c
CVE-2021-35557 Core RDBMS Create Table Oracle Net No 4.3 Network Low Low None Un-

changed
None None Low 12.1.0.2, 12.2.0.1, 19c, 21c
CVE-2021-35558 Core RDBMS Create Table Oracle Net No 4.3 Network Low Low None Un-

changed
None None Low 12.1.0.2, 12.2.0.1, 19c, 21c
CVE-2021-26272 Oracle Application Express (CKEditor) None HTTP Yes 4.3 Network Low None Required Un-

changed
None None Low Prior to 21.1.0
CVE-2021-35576 Oracle Database Enterprise Edition Unified Audit Local Logon Oracle Net No 2.7 Network Low High None Un-

changed
None Low None 12.1.0.2, 12.2.0.1, 19c

Additional CVEs addressed are:

  • The patch for CVE-2021-25122 also addresses CVE-2020-9484 and CVE-2021-25329.
  • The patch for CVE-2021-26272 also addresses CVE-2021-26271.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Autonomous Health Framework (Apache Commons IO): CVE-2021-29425.
  • GraalVM Multilingual Engine: CVE-2021-29921, CVE-2020-28928, CVE-2021-2341, CVE-2021-2369, CVE-2021-2388 and CVE-2021-2432.
  • Oracle Spatial and Graph – GeoRaster (OpenJPEG): CVE-2020-27824.

Oracle Essbase Risk Matrix

This Critical Patch Update contains 5 new security patches for Oracle Essbase. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-35652 Essbase Administration Services EAS Console HTTP Yes 10.0 Network Low None None Changed High High High Prior to 11.1.2.4.046, Prior to 21.3
CVE-2021-35651 Essbase Administration Services EAS Console HTTP No 8.5 Network Low Low None Changed High Low None Prior to 11.1.2.4.046, Prior to 21.3
CVE-2021-35653 Essbase Administration Services EAS Console HTTP No 7.7 Network Low Low None Changed High None None Prior to 11.1.2.4.046, Prior to 21.3
CVE-2021-35654 Essbase Administration Services EAS Console HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 11.1.2.4.046, Prior to 21.3
CVE-2021-35655 Essbase Administration Services EAS Console HTTP Yes 5.3 Network Low None None Un-

changed
Low None None Prior to 11.1.2.4.046, Prior to 21.3

Oracle Global Lifecycle Management Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Global Lifecycle Management. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Global Lifecycle Management. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Global Lifecycle Management OPatch
    • Patch Installer (Apache Commons Compress): CVE-2021-36090, CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
    • Patch Installer (jackson-databind): CVE-2020-25649.

Oracle GoldenGate Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle GoldenGate. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2019-3740 Oracle GoldenGate Install (Dell BSAFE Crypto-J) Oracle Net Yes 6.5 Network Low None Required Un-

changed
High None None Prior to 19.1.0.0.0.210420

Additional CVEs addressed are:

  • The patch for CVE-2019-3740 also addresses CVE-2019-3738 and CVE-2019-3739.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle GoldenGate
    • General (Apache Batik): CVE-2020-11987 and CVE-2019-17566.
    • Install (jQuery): CVE-2020-11023, CVE-2019-11358 and CVE-2020-11022.
    • Internal Framework (Google Guava): CVE-2018-10237 and CVE-2020-8908.

Oracle Graph Server and Client Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Graph Server and Client. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-25122 Oracle Graph Server and Client Packaging/install (Apache Tomcat) HTTP Yes 7.5 Network Low None None Un-

changed
High None None Prior to 21.3.0

Additional CVEs addressed are:

  • The patch for CVE-2021-25122 also addresses CVE-2021-25329.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Graph Server and Client
    • Packaging/Install (Guava): CVE-2020-8908.
    • Packaging/Install (Lodash): CVE-2021-23337 and CVE-2020-28500.
    • Packaging/Install (jackson-databind): CVE-2020-25649.

Oracle NoSQL Database Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle NoSQL Database
    • Administration (Go): CVE-2021-34558.
    • Administration (Netty): CVE-2021-21409.

Oracle REST Data Services Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle REST Data Services. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-28165 Oracle REST Data Services General (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High Prior to 21.3

Additional CVEs addressed are:

  • The patch for CVE-2021-28165 also addresses CVE-2021-28169 and CVE-2021-34428.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle REST Data Services
    • Infrastructure (Apache Batik): CVE-2020-11988, CVE-2019-17566 and CVE-2020-11987.

Oracle Secure Backup Risk Matrix

This Critical Patch Update contains 1 new security patch plus additional third party patches noted below for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3450 Oracle Secure Backup Oracle Secure Backup (OpenSSL) TLS Yes 7.4 Network High None None Un-

changed
High High None Prior to 18.1.0.1.0

Additional CVEs addressed are:

  • The patch for CVE-2021-3450 also addresses CVE-2021-3449.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Secure Backup
    • Generic (PHP): CVE-2021-21702, CVE-2020-7065 and CVE-2020-7071.

Oracle Spatial Studio Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle Spatial Studio. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Spatial Studio. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Spatial Studio
    • Install (Apache Commons IO): CVE-2021-29425.
    • Install (Apache Commons BeanUtils): CVE-2019-10086.

Oracle SQL Developer Risk Matrix

This Critical Patch Update contains no new security patches but does include third party patches noted below for Oracle SQL Developer. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability

There are no exploitable vulnerabilities for these products.

Third party patches for non-exploitable CVEs are noted below.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • SQL Developer Data Modeler
    • Infrastructure (Apache PDFBox): CVE-2021-27807.

Oracle Commerce Risk Matrix

This Critical Patch Update contains 2 new security patches for Oracle Commerce. Neither of these vulnerabilities may be remotely exploitable without authentication, i.e., neither may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-37695 Oracle Commerce Guided Search Content Acquisition System (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 11.3.2
CVE-2021-37695 Oracle Commerce Merchandising Merchandising (CKEditor) HTTP No 5.4 Network Low Low Required Changed Low Low None 11.3.2

Additional CVEs addressed are:

  • The patch for CVE-2021-37695 also addresses CVE-2021-32808 and CVE-2021-32809.

Oracle Communications Applications Risk Matrix

This Critical Patch Update contains 19 new security patches for Oracle Communications Applications. 14 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-3177 Oracle Communications Pricing Design Center Pricing (Python) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.0.0.3.0
CVE-2021-2351 Oracle Communications MetaSolv Solution Reports (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 6.3.1
CVE-2021-22118 Oracle Communications BRM – Elastic Charging Engine Controller (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 12.0.0.3
CVE-2021-36090 Oracle Communications Messaging Server Message Store (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.1
CVE-2021-30468 Oracle Communications Messaging Server Security (Apache CXF) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.1
CVE-2020-25648 Oracle Communications Offline Mediation Controller Storage & Reporting (NSS) HTTPS Yes 7.5 Network Low None None Un-

changed
None None High 12.0.0.3.0
CVE-2019-10086 Oracle Communications Billing and Revenue Management Billing Care (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 7.5.0.0.0, 12.0.0.3.0
CVE-2021-23337 Oracle Communications Design Studio PSR Designer (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 7.4.2
CVE-2020-6950 Oracle Communications Pricing Design Center Services Manager (Eclipse Mojarra) HTTP Yes 6.5 Network Low None Required Un-

changed
High None None 12.0.0.3.0
CVE-2021-21409 Oracle Communications BRM – Elastic Charging Engine OUI Installer (Netty) HTTP Yes 5.9 Network High None None Un-

changed
None High None 12.0.0.3
CVE-2021-21409 Oracle Communications Design Studio PSR Designer (Netty) HTTP Yes 5.9 Network High None None Un-

changed
None High None 7.4.2
CVE-2021-21409 Oracle Communications Messaging Server Multiplexor (Netty) HTTP Yes 5.9 Network High None None Un-

changed
None High None 8.1
CVE-2020-17521 Oracle Communications BRM – Elastic Charging Engine Orchestration (Apache Groovy) None No 5.5 Local Low Low None Un-

changed
High None None 12.0.0.3
CVE-2021-31812 Oracle Communications Messaging Server Monitoring (Apache PDFBox) None No 5.5 Local Low None Required Un-

changed
None None High 8.1
CVE-2021-28657 Oracle Communications Messaging Server Monitoring (Apache Tika) None No 5.5 Local Low None Required Un-

changed
None None High 8.1
CVE-2021-29425 Oracle Communications Calendar Server Administration (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.0.0.6.0
CVE-2021-29425 Oracle Communications Messaging Server Message Store (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.1
CVE-2021-29425 Oracle Communications MetaSolv Solution Reports (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 6.3.1
CVE-2021-33037 Oracle Communications Pricing Design Center Pricing (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.0.0.3.0

Additional CVEs addressed are:

  • The patch for CVE-2021-21409 also addresses CVE-2021-21290.
  • The patch for CVE-2021-23337 also addresses CVE-2020-28500.
  • The patch for CVE-2021-30468 also addresses CVE-2021-21290.
  • The patch for CVE-2021-3177 also addresses CVE-2021-23336.
  • The patch for CVE-2021-31812 also addresses CVE-2021-27807 and CVE-2021-27906.
  • The patch for CVE-2021-33037 also addresses CVE-2021-30369 and CVE-2021-30640.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.

Oracle Communications Risk Matrix

This Critical Patch Update contains 71 new security patches plus additional third party patches noted below for Oracle Communications. 56 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-21345 Oracle Communications Policy Management Policy (XStream) HTTP No 9.9 Network Low Low None Changed High High High 12.5.0
CVE-2021-21783 Oracle Communications Diameter Signaling Router Platform (gSOAP) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.0.0-8.5.0.0
CVE-2017-9841 Oracle Communications Diameter Signaling Router Signaling (PHP) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.0.0-8.5.0.0
CVE-2021-21783 Oracle Communications EAGLE LNP Application Processor Patches (gSOAP) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 46.7, 46.8, 46.9
CVE-2020-11998 Oracle Communications Element Manager Work orders (Apache ActiveMQ) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.2.0.0-8.2.4.0
CVE-2021-21783 Oracle Communications LSMS Platform (gSOAP) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 13.1, 13.2, 13.3, 13.4
CVE-2020-17530 Oracle Communications Policy Management Enterprise Policy (Apache Struts2) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.5.0
CVE-2020-11998 Oracle Communications Session Report Manager Reports (Apache ActiveMQ) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.0.0-8.2.2.0
CVE-2020-11998 Oracle Communications Session Route Manager Route Manager (Apache ActiveMQ) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 8.0.0.0-8.2.2.0
CVE-2021-21783 Tekelec Virtual Operating Environment Syscheck (gSOAP) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 3.4.0-3.7.1
CVE-2021-23017 Oracle Communications Control Plane Monitor Infrastructure (nginx) HTTP Yes 9.4 Network Low None None Un-

changed
High High Low 3.4, 4.2, 4.3, 4.4
CVE-2021-23017 Oracle Communications Fraud Monitor Infrastructure (nginx) HTTP Yes 9.4 Network Low None None Un-

changed
High High Low 3.4-4.4
CVE-2021-23017 Oracle Communications Operations Monitor Developer Infrastructure (nginx) HTTP Yes 9.4 Network Low None None Un-

changed
High High Low 3.4, 4.2, 4.3, 4.4
CVE-2021-23017 Oracle Enterprise Telephony Fraud Monitor Policies (nginx) HTTP Yes 9.4 Network Low None None Un-

changed
High High Low 3.4, 4.2, 4.3, 4.4
CVE-2021-22112 Oracle Communications Element Manager Work Orders (Spring Security) HTTP No 8.8 Network Low Low None Un-

changed
High High High 8.2.0.0-8.2.4.0
CVE-2020-10878 Oracle Communications Diameter Signaling Router Platform (Perl) HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 8.0.0.0-8.5.0.0
CVE-2020-10878 Oracle Communications LSMS Platform (Perl) HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 13.1-13.4
CVE-2020-10878 Tekelec Platform Distribution Platform (Perl) HTTP Yes 8.6 Network Low None None Un-

changed
Low Low High 7.4.0-7.7.1
CVE-2021-2351 Oracle Communications Application Session Controller Signaling (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 3.9
CVE-2021-2461 Oracle Communications Interactive Session Recorder Provision API HTTP Yes 8.3 Network Low None None Changed Low Low Low 6.4
CVE-2021-2351 Oracle Communications Session Report Manager Reports (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.0.0.0-8.2.5.0
CVE-2021-2351 Oracle Communications Session Route Manager Route Manager (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 8.2.0.0-8.2.5.0
CVE-2020-10543 Oracle Communications EAGLE LNP Application Processor Realtime db (Perl) HTTP Yes 8.2 Network Low None None Un-

changed
None Low High 46.7, 46.8, 46.9
CVE-2020-24750 Oracle Communications Element Manager Security (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 8.2.0.0-8.2.4.0
CVE-2020-24750 Oracle Communications Policy Management Policy (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 12.5.0
CVE-2020-24750 Oracle Communications Session Report Manager Reports (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 8.0.0.0-8.2.2.1
CVE-2020-28052 Oracle Communications Session Report Manager Reports (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 8.0.0.0-8.2.4.0
CVE-2020-24750 Oracle Communications Session Route Manager Reports (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 8.2.0.0-8.2.2.1
CVE-2020-28052 Oracle Communications Session Route Manager Route Manager (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 8.2.0.0-8.2.4.0
CVE-2021-22118 Oracle Communications Element Manager Work Orders (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 8.2.0.0-8.2.4.0
CVE-2021-22118 Oracle Communications Interactive Session Recorder Monitor (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 6.4
CVE-2021-22118 Oracle Communications Session Report Manager Reports (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 8.0.0.0-8.2.4.0
CVE-2021-22118 Oracle Communications Session Route Manager Route Manager (Spring Framework) None No 7.8 Local Low Low None Un-

changed
High High High 8.0.0.0-8.2.4.0
CVE-2020-29661 Tekelec Platform Distribution Storage Management (Kernel) None No 7.8 Local Low Low None Un-

changed
High High High 7.4.0-7.7.1
CVE-2021-3156 Tekelec Platform Distribution Storage Management (Sudo) None No 7.8 Local Low Low None Un-

changed
High High High 7.4.0-7.7.1
CVE-2021-33560 Oracle Communications Cloud Native Core Network Repository Function Measurements (libgcrypt) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 1.14.0
CVE-2020-11994 Oracle Communications Diameter Signaling Router IDIH – Visualization (Apache Camel) HTTP Yes 7.5 Network Low None None Un-

changed
High None None 8.0.0.0-8.5.0.0
CVE-2020-25649 Oracle Communications Diameter Signaling Router IDIH – Visualization (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 8.0.0.0-8.5.0.0
CVE-2021-36090 Oracle Communications Element Manager Fault Management (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.2.0.0-8.2.4.0
CVE-2021-30468 Oracle Communications Element Manager Work Orders (Apache CXF) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.2.2
CVE-2021-28165 Oracle Communications Element Manager Work Orders (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.2.2
CVE-2018-20034 Oracle Communications LSMS NPA Agent (Flexnet) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 13.1-13.4
CVE-2020-5258 Oracle Communications Policy Management Policy (dojo) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 12.5.0
CVE-2020-5398 Oracle Communications Policy Management VNF Manager (Spring Framework) HTTP Yes 7.5 Network High None Required Un-

changed
High High High 12.5.0
CVE-2021-28165 Oracle Communications Services Gatekeeper Messaging Service (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 7.0
CVE-2020-7226 Oracle Communications Services Gatekeeper Payment (Cryptacular) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 7.0
CVE-2021-22696 Oracle Communications Session Report Manager Reports (Apache CXF) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.2.4.0
CVE-2021-36090 Oracle Communications Session Report Manager Reports (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.2.0.0-8.2.5.0
CVE-2021-28165 Oracle Communications Session Report Manager Reports (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.2.4.0
CVE-2021-22696 Oracle Communications Session Route Manager Route Manager (Apache CXF) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.2.4.0
CVE-2021-36090 Oracle Communications Session Route Manager Route Manager (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.2.5.0
CVE-2021-28165 Oracle Communications Session Route Manager Route Manager (Eclipse Jetty) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 8.0.0.0-8.2.4.0
CVE-2021-25215 Tekelec Platform Distribution Storage Management (BIND) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 7.4.0-7.7.1
CVE-2019-10086 Oracle Communications Policy Management Policy (Apache Commons BeanUtils) HTTP Yes 7.3 Network Low None None Un-

changed
Low Low Low 12.5.0
CVE-2021-23337 Oracle Communications Cloud Native Core Policy Signaling (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 1.11.0
CVE-2021-23337 Oracle Communications Session Border Controller Routing (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 8.4, 9.0
CVE-2021-23337 Oracle Enterprise Communications Broker Routing (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 3.2, 3.3
CVE-2021-2414 Oracle Communications Session Border Controller Routing HTTP No 6.8 Network Low High None Changed High None None 8.4, 9.0
CVE-2020-8622 Oracle Communications Diameter Signaling Router Provisioning (BIND) HTTP No 6.5 Network Low Low None Un-

changed
None None High 8.0.0.0-8.5.0.0
CVE-2021-30640 Tekelec Platform Distribution Console (Apache Tomcat) HTTP Yes 6.5 Network High None None Un-

changed
Low High None 7.4.0-7.7.1
CVE-2021-27906 Oracle Communications Session Report Manager Reports (Apache PDFBox) None No 5.5 Local Low None Required Un-

changed
None None High 8.0.0.0-8.2.4.0
CVE-2021-29425 Oracle Communications Application Session Controller Signaling (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 3.9
CVE-2021-29425 Oracle Communications Converged Application Server – Service Controller Charging (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 6.2
CVE-2021-33037 Oracle Communications Diameter Signaling Router Platform (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 8.0.0.0-8.5.0.0
CVE-2021-33037 Oracle Communications Policy Management MediationServer (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 12.5.0
CVE-2021-29425 Oracle Communications Session Report Manager Reports (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.0.0.0-8.2.5.0
CVE-2021-33037 Oracle Communications Session Report Manager Reports (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 8.0.0.0-8.2.4.0
CVE-2021-29425 Oracle Communications Session Route Manager Route Manager (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 8.0.0.0-8.2.5.0
CVE-2021-33037 Oracle Communications Session Route Manager Route Manager (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 8.0.0.0-8.2.4.0
CVE-2021-2416 Oracle Communications Session Border Controller Routing HTTP No 4.9 Network Low High None Un-

changed
None None High 8.4, 9.0
CVE-2020-9488 Oracle Communications EAGLE FTP Table Base Retrieval Logging (Apache Log4j) HTTP Yes 3.7 Network High None None Un-

changed
Low None None 4.5

Additional CVEs addressed are:

  • The patch for CVE-2017-9841 also addresses CVE-2020-7069 and CVE-2021-21702.
  • The patch for CVE-2018-20034 also addresses CVE-2018-20031, CVE-2018-20032 and CVE-2018-20033.
  • The patch for CVE-2020-10543 also addresses CVE-2020-10878.
  • The patch for CVE-2020-10878 also addresses CVE-2020-10543 and CVE-2020-12723.
  • The patch for CVE-2020-11998 also addresses CVE-2020-13947 and CVE-2021-26117.
  • The patch for CVE-2020-17530 also addresses CVE-2019-0230 and CVE-2019-0233.
  • The patch for CVE-2020-24750 also addresses CVE-2020-24616, CVE-2020-25649 and CVE-2020-36189.
  • The patch for CVE-2020-25649 also addresses CVE-2020-14195, CVE-2020-35490, CVE-2020-35491, CVE-2020-35728, CVE-2020-36179, CVE-2020-36180, CVE-2020-36181, CVE-2020-36182, CVE-2020-36183, CVE-2020-36184, CVE-2020-36185, CVE-2020-36186, CVE-2020-36187, CVE-2020-36188 and CVE-2020-36189.
  • The patch for CVE-2020-29661 also addresses CVE-2021-20265, CVE-2021-27364 and CVE-2021-27365.
  • The patch for CVE-2020-5398 also addresses CVE-2020-5397.
  • The patch for CVE-2020-9488 also addresses CVE-2017-5645.
  • The patch for CVE-2021-21345 also addresses CVE-2020-26217, CVE-2021-21341, CVE-2021-21342, CVE-2021-21343, CVE-2021-21344, CVE-2021-21346, CVE-2021-21347, CVE-2021-21348, CVE-2021-21349, CVE-2021-21350, CVE-2021-21351 and CVE-2021-29505.
  • The patch for CVE-2021-23337 also addresses CVE-2020-28500 and CVE-2020-8203.
  • The patch for CVE-2021-27906 also addresses CVE-2021-27807.
  • The patch for CVE-2021-28165 also addresses CVE-2020-27218, CVE-2021-28163 and CVE-2021-28164.
  • The patch for CVE-2021-30468 also addresses CVE-2021-22696.
  • The patch for CVE-2021-30640 also addresses CVE-2016-0762, CVE-2016-5018, CVE-2016-6794, CVE-2016-6796, CVE-2016-6797 and CVE-2021-33037.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.

Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:

  • Oracle Communications EAGLE
    • Health Check (Perl): CVE-2020-10878, CVE-2020-10543 and CVE-2020-12723.

Oracle Construction and Engineering Risk Matrix

This Critical Patch Update contains 12 new security patches for Oracle Construction and Engineering. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-26691 Instantis EnterpriseTrack Core (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 17.1, 17.2, 17.3
CVE-2021-2351 Instantis EnterpriseTrack Core (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.1, 17.2, 17.3
CVE-2021-2351 Primavera Gateway Admin (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7
CVE-2021-36090 Primavera Gateway Admin (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7
CVE-2021-36090 Primavera Unifier File Management (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 17.7-17.12, 18.8, 19.12, 20.12
CVE-2021-23337 Primavera Gateway Admin (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7
CVE-2021-23337 Primavera Unifier Platform, UI (Lodash) HTTP No 7.2 Network Low High None Un-

changed
High High High 17.7-17.12, 18.8, 19.12, 20.12
CVE-2021-36374 Primavera Gateway Admin (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11, 20.12.0-20.12.7
CVE-2021-28657 Primavera Unifier Platform (Apache Tika) None No 5.5 Local Low None Required Un-

changed
None None High 17.7-17.12, 18.8, 19.12, 20.12
CVE-2021-36374 Primavera Unifier System Configuration (Apache Ant) None No 5.5 Local Low None Required Un-

changed
None None High 17.7-17.12, 18.8, 19.12, 20.12
CVE-2021-33037 Instantis EnterpriseTrack Core (Apache Tomcat) HTTP Yes 5.3 Network Low None None Un-

changed
None Low None 17.1, 17.2, 17.3
CVE-2021-29425 Primavera Gateway Admin (Apache Commons IO) HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 17.12.0-17.12.11, 18.8.0-18.8.12, 19.12.0-19.12.11

Additional CVEs addressed are:

  • The patch for CVE-2021-23337 also addresses CVE-2020-28500 and CVE-2020-8203.
  • The patch for CVE-2021-26691 also addresses CVE-2019-17567, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-30641 and CVE-2021-31618.
  • The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516 and CVE-2021-35517.
  • The patch for CVE-2021-36374 also addresses CVE-2021-36373.

Oracle E-Business Suite Risk Matrix

This Critical Patch Update contains 18 new security patches for Oracle E-Business Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (October 2021), My Oracle Support Note 2484000.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-35566 Oracle Applications Manager Diagnostics HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.3, 12.2.3-12.2.10
CVE-2021-2483 Oracle Content Manager Content Item Manager HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-35536 Oracle Deal Management Miscellaneous HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-35585 Oracle Incentive Compensation User Interface HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-35570 Oracle Mobile Field Service Admin UI HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3, 12.2.3-12.2.10
CVE-2021-2484 Oracle Operations Intelligence BIS Operations Intelligence HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-2482 Oracle Payables Invoice Approvals HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-35563 Oracle Shipping Execution Workflow Events HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.2.6-12.2.10
CVE-2021-2485 Oracle Trade Management Quotes HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-35562 Oracle Universal Work Queue Work Provider Site Level Administration HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3, 12.2.3-12.2.10
CVE-2021-2474 Oracle Web Analytics Admin HTTP No 8.1 Network Low Low None Un-

changed
High High None 12.1.1-12.1.3
CVE-2021-35582 Oracle Applications Manager View Reports HTTP No 6.5 Network Low Low Required Changed Low Low Low 12.1.3, 12.2.3-12.2.10
CVE-2021-35580 Oracle Applications Manager View Reports HTTP Yes 6.1 Network Low None Required Changed Low Low None 12.1.3, 12.2.3-12.2.10
CVE-2021-2477 Oracle Applications Framework Session Management HTTP Yes 5.3 Network Low None None Un-

changed
None None Low 12.1.3, 12.2.3-12.2.10
CVE-2021-35554 Oracle Trade Management Quotes HTTP Yes 5.3 Network Low None None Un-

changed
Low None None 12.1.1-12.1.3, 12.2.3-12.2.10
CVE-2021-35569 Oracle Applications Manager Diagnostics HTTP No 4.9 Network Low High None Un-

changed
High None None 12.1.3, 12.2.3-12.2.10
CVE-2021-35581 Oracle Applications Manager View Reports HTTP Yes 4.7 Network Low None Required Changed None Low None 12.1.3, 12.2.3-12.2.10
CVE-2021-35611 Oracle Sales Offline Offline Template HTTP No 4.3 Network Low Low None Un-

changed
None None Low 12.1.1-12.1.3, 12.2.3-12.2.10

Oracle Enterprise Manager Risk Matrix

This Critical Patch Update contains 8 new security patches for Oracle Enterprise Manager. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.

Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2021 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2021 Patch Availability Document for Oracle Products, My Oracle Support Note 2796575.1.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-26691 Enterprise Manager Ops Center Networking (Apache HTTP Server) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 12.4.0.0
CVE-2021-2137 Enterprise Manager Base Platform Policy Framework HTTP No 8.8 Network Low Low None Un-

changed
High High High 13.4.0.0, 13.5.0.0
CVE-2021-29505 Enterprise Manager Ops Center Guest Management (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 12.4.0.0
CVE-2021-3518 Enterprise Manager Ops Center Guest Management (libxml2) HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 12.4.0.0
CVE-2021-3518 Oracle Real User Experience Insight End User Experience Management (libxml2) HTTP Yes 8.8 Network Low None Required Un-

changed
High High High 13.5.1.0, 13.4.1.0
CVE-2021-2351 Oracle Real User Experience Insight End User Experience Management (JDBC) Oracle Net Yes 8.3 Network High None Required Changed High High High 13.5.1.0, 13.4.1.0
CVE-2020-25649 Oracle Application Testing Suite Load Testing for Web Apps (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 13.3.0.1
CVE-2021-20227 Enterprise Manager for Oracle Database Provisioning (SQLite) None No 5.5 Local Low Low None Un-

changed
None None High 13.4.0.0

Additional CVEs addressed are:

  • The patch for CVE-2020-25649 also addresses CVE-2020-24616, CVE-2020-24750, CVE-2020-35490, CVE-2020-35491, CVE-2020-35728, CVE-2020-36179, CVE-2020-36180, CVE-2020-36181, CVE-2020-36182, CVE-2020-36183, CVE-2020-36184, CVE-2020-36185, CVE-2020-36186, CVE-2020-36187, CVE-2020-36188 and CVE-2020-36189.
  • The patch for CVE-2021-26691 also addresses CVE-2019-17567, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-30641 and CVE-2021-31618.
  • The patch for CVE-2021-3518 also addresses CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3517 and CVE-2021-3537.

Oracle Financial Services Applications Risk Matrix

This Critical Patch Update contains 44 new security patches for Oracle Financial Services Applications. 26 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.

CVE# Product Component Protocol Remote

Exploit

without

Auth.?
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) Supported Versions Affected Notes
Base

Score
Attack

Vector
Attack

Complex
Privs

Req’d
User

Interact
Scope Confid-

entiality
Inte-

grity
Avail-

ability
CVE-2021-21345 Oracle Banking Virtual Account Management Common Core (XStream) HTTP No 9.9 Network Low Low None Changed High High High 14.2, 14.3, 14.5
CVE-2020-5413 Oracle Banking Corporate Lending Process Management Loans (Spring Integration) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-5413 Oracle Banking Credit Facilities Process Management Credit Appraisal (Spring Integration) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-5413 Oracle Banking Supply Chain Finance Account-Maintenance (Spring Integration) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-5413 Oracle Banking Virtual Account Management Common Core (Spring Integration) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-10683 Oracle FLEXCUBE Core Banking Bills And Collections (dom4j) HTTP Yes 9.8 Network Low None None Un-

changed
High High High 11.7, 11.8, 11.9, 11.10
CVE-2021-29505 Oracle Banking Cash Management Accessibility (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2021-29505 Oracle Banking Corporate Lending Process Management Lending (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2021-29505 Oracle Banking Credit Facilities Process Management Credit Appraisal (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-15824 Oracle Banking Extensibility Workbench Web UI (Kotlin) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2021-29505 Oracle Banking Supply Chain Finance Account-Maintenance (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2021-29505 Oracle Banking Trade Finance Process Management Dashboard (XStream) HTTP No 8.8 Network Low Low None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-24750 Oracle Banking Corporate Lending Process Management Lending (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-28052 Oracle Banking Corporate Lending Process Management Loans (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-24750 Oracle Banking Credit Facilities Process Management Credit Appraisal (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-28052 Oracle Banking Credit Facilities Process Management Credit Appraisal (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-28052 Oracle Banking Extensibility Workbench Web UI (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-24750 Oracle Banking Supply Chain Finance Invoice (jackson-databind) HTTP Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-28052 Oracle Banking Supply Chain Finance Security (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-28052 Oracle Banking Virtual Account Management Common Core (Bouncy Castle Java Library) HTTPS Yes 8.1 Network High None None Un-

changed
High High High 14.2, 14.3, 14.5
CVE-2020-25649 Oracle Banking Extensibility Workbench Web UI (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed
None High None 14.2, 14.3, 14.5
CVE-2021-36090 Oracle Banking Platform Product Accounting (Apache Commons Compress) HTTP Yes 7.5 Network Low None None Un-

changed
None None High 2.6.2, 2.7.1, 2.9.0, 2.12.0
CVE-2020-25649 Oracle Banking Virtual Account Management Account (jackson-databind) HTTP Yes 7.5 Network Low None None Un-

changed