CVE-2024-20950: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. in Oracle Corporation Customer Interaction History
Vulnerability in the Oracle Customer Interaction History product of Oracle E-Business Suite (component: Outcome-Result). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2024-20950 is a vulnerability affecting Oracle Customer Interaction History, a component of the Oracle E-Business Suite specifically within the Outcome-Result module. The affected versions range from 12.2.3 through 12.2.13. This vulnerability allows an unauthenticated attacker with network access over HTTP to exploit the system. The attack requires human interaction from a user other than the attacker, indicating a social engineering element such as phishing or tricking a user into performing an action that triggers the exploit. The vulnerability leads to a scope change, meaning that while it originates in the Customer Interaction History product, it can impact additional Oracle products connected or integrated with it. Successful exploitation can result in unauthorized read access to a subset of data, as well as unauthorized update, insert, or delete operations on accessible data within the Oracle Customer Interaction History system. The CVSS 3.1 base score is 6.1, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), required user interaction (UI:R), scope change (S:C), and low confidentiality and integrity impacts (C:L, I:L), with no impact on availability (A:N). The vulnerability is easily exploitable due to low complexity and no authentication requirements, but the need for user interaction limits automated exploitation. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting organizations should prioritize monitoring and mitigation. The vulnerability's impact on confidentiality and integrity could lead to data leakage or unauthorized data manipulation, potentially affecting business operations and customer trust.
Potential Impact
For European organizations, the impact of CVE-2024-20950 can be significant, especially for those relying on Oracle E-Business Suite Customer Interaction History for managing customer data and interactions. Unauthorized read access could expose sensitive customer information, leading to privacy violations under GDPR and potential regulatory penalties. Unauthorized modification of data could corrupt customer records, disrupt business processes, and degrade service quality. The scope change implies that integrated Oracle products could also be compromised, amplifying the risk across enterprise systems. Given the requirement for user interaction, phishing or social engineering campaigns targeting European employees could be a vector, increasing the risk of successful exploitation. The medium severity rating suggests a moderate but tangible threat that could affect confidentiality and integrity without causing system downtime. Organizations in sectors such as finance, telecommunications, retail, and public services that heavily use Oracle E-Business Suite are particularly at risk, as compromised customer data could lead to financial fraud, reputational damage, and operational disruptions.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Conduct immediate inventory and version assessment of Oracle Customer Interaction History deployments to identify affected versions (12.2.3 to 12.2.13). 2) Monitor Oracle security advisories closely for official patches or workarounds and apply them promptly once available. 3) Implement strict network segmentation and firewall rules to restrict HTTP access to Oracle E-Business Suite components, limiting exposure to untrusted networks. 4) Enhance user awareness training focused on phishing and social engineering to reduce the likelihood of successful user interaction exploitation. 5) Deploy web application firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting Oracle Customer Interaction History endpoints. 6) Enable detailed logging and monitoring of database operations related to Customer Interaction History to detect unauthorized read or write activities. 7) Review and tighten access controls and permissions within Oracle E-Business Suite to minimize data exposure and limit the impact of potential exploits. 8) Consider implementing multi-factor authentication (MFA) for users accessing Oracle systems to add an additional security layer, even though the vulnerability does not require authentication. 9) Prepare incident response plans specifically addressing potential data integrity and confidentiality breaches stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-20950: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. in Oracle Corporation Customer Interaction History
Description
Vulnerability in the Oracle Customer Interaction History product of Oracle E-Business Suite (component: Outcome-Result). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data as well as unauthorized read access to a subset of Oracle Customer Interaction History accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2024-20950 is a vulnerability affecting Oracle Customer Interaction History, a component of the Oracle E-Business Suite specifically within the Outcome-Result module. The affected versions range from 12.2.3 through 12.2.13. This vulnerability allows an unauthenticated attacker with network access over HTTP to exploit the system. The attack requires human interaction from a user other than the attacker, indicating a social engineering element such as phishing or tricking a user into performing an action that triggers the exploit. The vulnerability leads to a scope change, meaning that while it originates in the Customer Interaction History product, it can impact additional Oracle products connected or integrated with it. Successful exploitation can result in unauthorized read access to a subset of data, as well as unauthorized update, insert, or delete operations on accessible data within the Oracle Customer Interaction History system. The CVSS 3.1 base score is 6.1, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), required user interaction (UI:R), scope change (S:C), and low confidentiality and integrity impacts (C:L, I:L), with no impact on availability (A:N). The vulnerability is easily exploitable due to low complexity and no authentication requirements, but the need for user interaction limits automated exploitation. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting organizations should prioritize monitoring and mitigation. The vulnerability's impact on confidentiality and integrity could lead to data leakage or unauthorized data manipulation, potentially affecting business operations and customer trust.
Potential Impact
For European organizations, the impact of CVE-2024-20950 can be significant, especially for those relying on Oracle E-Business Suite Customer Interaction History for managing customer data and interactions. Unauthorized read access could expose sensitive customer information, leading to privacy violations under GDPR and potential regulatory penalties. Unauthorized modification of data could corrupt customer records, disrupt business processes, and degrade service quality. The scope change implies that integrated Oracle products could also be compromised, amplifying the risk across enterprise systems. Given the requirement for user interaction, phishing or social engineering campaigns targeting European employees could be a vector, increasing the risk of successful exploitation. The medium severity rating suggests a moderate but tangible threat that could affect confidentiality and integrity without causing system downtime. Organizations in sectors such as finance, telecommunications, retail, and public services that heavily use Oracle E-Business Suite are particularly at risk, as compromised customer data could lead to financial fraud, reputational damage, and operational disruptions.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Conduct immediate inventory and version assessment of Oracle Customer Interaction History deployments to identify affected versions (12.2.3 to 12.2.13). 2) Monitor Oracle security advisories closely for official patches or workarounds and apply them promptly once available. 3) Implement strict network segmentation and firewall rules to restrict HTTP access to Oracle E-Business Suite components, limiting exposure to untrusted networks. 4) Enhance user awareness training focused on phishing and social engineering to reduce the likelihood of successful user interaction exploitation. 5) Deploy web application firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting Oracle Customer Interaction History endpoints. 6) Enable detailed logging and monitoring of database operations related to Customer Interaction History to detect unauthorized read or write activities. 7) Review and tighten access controls and permissions within Oracle E-Business Suite to minimize data exposure and limit the impact of potential exploits. 8) Consider implementing multi-factor authentication (MFA) for users accessing Oracle systems to add an additional security layer, even though the vulnerability does not require authentication. 9) Prepare incident response plans specifically addressing potential data integrity and confidentiality breaches stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.626Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dbfa6182aa0cae249832b
Added to database: 6/2/2025, 3:13:42 PM
Last enriched: 7/3/2025, 4:42:15 PM
Last updated: 7/30/2025, 6:06:26 PM
Views: 8
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
UnknownCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.