Skip to main content

CVE-2024-20950: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. in Oracle Corporation Customer Interaction History

Medium
VulnerabilityCVE-2024-20950cvecve-2024-20950
Published: Tue Jan 16 2024 (01/16/2024, 21:41:20 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Customer Interaction History

Description

Vulnerability in the Oracle Customer Interaction History product of Oracle E-Business Suite (component: Outcome-Result). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/03/2025, 16:42:15 UTC

Technical Analysis

CVE-2024-20950 is a vulnerability affecting Oracle Customer Interaction History, a component of the Oracle E-Business Suite specifically within the Outcome-Result module. The affected versions range from 12.2.3 through 12.2.13. This vulnerability allows an unauthenticated attacker with network access over HTTP to exploit the system. The attack requires human interaction from a user other than the attacker, indicating a social engineering element such as phishing or tricking a user into performing an action that triggers the exploit. The vulnerability leads to a scope change, meaning that while it originates in the Customer Interaction History product, it can impact additional Oracle products connected or integrated with it. Successful exploitation can result in unauthorized read access to a subset of data, as well as unauthorized update, insert, or delete operations on accessible data within the Oracle Customer Interaction History system. The CVSS 3.1 base score is 6.1, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), required user interaction (UI:R), scope change (S:C), and low confidentiality and integrity impacts (C:L, I:L), with no impact on availability (A:N). The vulnerability is easily exploitable due to low complexity and no authentication requirements, but the need for user interaction limits automated exploitation. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting organizations should prioritize monitoring and mitigation. The vulnerability's impact on confidentiality and integrity could lead to data leakage or unauthorized data manipulation, potentially affecting business operations and customer trust.

Potential Impact

For European organizations, the impact of CVE-2024-20950 can be significant, especially for those relying on Oracle E-Business Suite Customer Interaction History for managing customer data and interactions. Unauthorized read access could expose sensitive customer information, leading to privacy violations under GDPR and potential regulatory penalties. Unauthorized modification of data could corrupt customer records, disrupt business processes, and degrade service quality. The scope change implies that integrated Oracle products could also be compromised, amplifying the risk across enterprise systems. Given the requirement for user interaction, phishing or social engineering campaigns targeting European employees could be a vector, increasing the risk of successful exploitation. The medium severity rating suggests a moderate but tangible threat that could affect confidentiality and integrity without causing system downtime. Organizations in sectors such as finance, telecommunications, retail, and public services that heavily use Oracle E-Business Suite are particularly at risk, as compromised customer data could lead to financial fraud, reputational damage, and operational disruptions.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Conduct immediate inventory and version assessment of Oracle Customer Interaction History deployments to identify affected versions (12.2.3 to 12.2.13). 2) Monitor Oracle security advisories closely for official patches or workarounds and apply them promptly once available. 3) Implement strict network segmentation and firewall rules to restrict HTTP access to Oracle E-Business Suite components, limiting exposure to untrusted networks. 4) Enhance user awareness training focused on phishing and social engineering to reduce the likelihood of successful user interaction exploitation. 5) Deploy web application firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting Oracle Customer Interaction History endpoints. 6) Enable detailed logging and monitoring of database operations related to Customer Interaction History to detect unauthorized read or write activities. 7) Review and tighten access controls and permissions within Oracle E-Business Suite to minimize data exposure and limit the impact of potential exploits. 8) Consider implementing multi-factor authentication (MFA) for users accessing Oracle systems to add an additional security layer, even though the vulnerability does not require authentication. 9) Prepare incident response plans specifically addressing potential data integrity and confidentiality breaches stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae249832b

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 4:42:15 PM

Last updated: 7/30/2025, 6:06:26 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats