CVE-2024-20987: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. in Oracle Corporation BI Publisher (formerly XML Publisher)
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
AI Analysis
Technical Summary
CVE-2024-20987 is a medium-severity vulnerability affecting Oracle BI Publisher version 12.2.1.4.0, a component of Oracle Analytics responsible for generating and managing business reports. The vulnerability resides in the web server component and allows a low-privileged attacker with network access via HTTP to compromise the system. Exploitation requires user interaction from a person other than the attacker, indicating a social engineering element such as tricking a user into clicking a malicious link or opening a crafted file. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting moderate risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to unauthorized read access to some data and unauthorized update, insert, or delete operations on Oracle BI Publisher accessible data. This implies an attacker could manipulate report data or extract sensitive information, potentially impacting data integrity and confidentiality but not availability. The vulnerability's impact extends beyond BI Publisher itself, potentially affecting other integrated Oracle products due to the scope change. No known exploits are currently reported in the wild, but the ease of exploitation and network accessibility make it a significant concern. The lack of a patch link suggests that organizations should monitor Oracle advisories closely for updates. Given the requirement for user interaction and low privileges, social engineering combined with network access is the likely attack path.
Potential Impact
For European organizations, the impact of CVE-2024-20987 could be substantial, especially for those relying on Oracle BI Publisher for critical reporting and analytics functions. Unauthorized data manipulation could lead to inaccurate business intelligence, affecting decision-making processes and compliance reporting. Confidentiality breaches could expose sensitive business or personal data, potentially violating GDPR and other data protection regulations, leading to legal and financial penalties. The scope change indicates that exploitation might compromise additional Oracle products integrated with BI Publisher, amplifying the risk across enterprise systems. Organizations in sectors such as finance, healthcare, government, and manufacturing—where Oracle Analytics is commonly deployed—may face operational disruptions and reputational damage. The requirement for user interaction means that phishing or social engineering campaigns could be leveraged to trigger exploitation, necessitating heightened user awareness. Although no active exploits are reported, the medium severity and ease of network access warrant proactive risk management to prevent potential data breaches and integrity violations.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately identify and inventory all Oracle BI Publisher 12.2.1.4.0 instances within their environment. 2) Restrict network access to BI Publisher web interfaces using network segmentation and firewall rules, limiting exposure to trusted internal networks or VPNs only. 3) Enhance user training and awareness programs focusing on phishing and social engineering risks, emphasizing caution with unsolicited links or attachments. 4) Monitor Oracle security advisories for patches or updates addressing CVE-2024-20987 and prioritize timely application once available. 5) Implement robust logging and monitoring on BI Publisher servers to detect unusual data access or modification activities, enabling rapid incident response. 6) Employ multi-factor authentication (MFA) for accessing BI Publisher interfaces to reduce the risk of unauthorized access. 7) Review and tighten access controls and permissions within BI Publisher to ensure least privilege principles are enforced, minimizing potential damage from compromised accounts. 8) Conduct regular security assessments and penetration tests focusing on Oracle Analytics environments to identify and remediate related vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2024-20987: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. in Oracle Corporation BI Publisher (formerly XML Publisher)
Description
Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
AI-Powered Analysis
Technical Analysis
CVE-2024-20987 is a medium-severity vulnerability affecting Oracle BI Publisher version 12.2.1.4.0, a component of Oracle Analytics responsible for generating and managing business reports. The vulnerability resides in the web server component and allows a low-privileged attacker with network access via HTTP to compromise the system. Exploitation requires user interaction from a person other than the attacker, indicating a social engineering element such as tricking a user into clicking a malicious link or opening a crafted file. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting moderate risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to unauthorized read access to some data and unauthorized update, insert, or delete operations on Oracle BI Publisher accessible data. This implies an attacker could manipulate report data or extract sensitive information, potentially impacting data integrity and confidentiality but not availability. The vulnerability's impact extends beyond BI Publisher itself, potentially affecting other integrated Oracle products due to the scope change. No known exploits are currently reported in the wild, but the ease of exploitation and network accessibility make it a significant concern. The lack of a patch link suggests that organizations should monitor Oracle advisories closely for updates. Given the requirement for user interaction and low privileges, social engineering combined with network access is the likely attack path.
Potential Impact
For European organizations, the impact of CVE-2024-20987 could be substantial, especially for those relying on Oracle BI Publisher for critical reporting and analytics functions. Unauthorized data manipulation could lead to inaccurate business intelligence, affecting decision-making processes and compliance reporting. Confidentiality breaches could expose sensitive business or personal data, potentially violating GDPR and other data protection regulations, leading to legal and financial penalties. The scope change indicates that exploitation might compromise additional Oracle products integrated with BI Publisher, amplifying the risk across enterprise systems. Organizations in sectors such as finance, healthcare, government, and manufacturing—where Oracle Analytics is commonly deployed—may face operational disruptions and reputational damage. The requirement for user interaction means that phishing or social engineering campaigns could be leveraged to trigger exploitation, necessitating heightened user awareness. Although no active exploits are reported, the medium severity and ease of network access warrant proactive risk management to prevent potential data breaches and integrity violations.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately identify and inventory all Oracle BI Publisher 12.2.1.4.0 instances within their environment. 2) Restrict network access to BI Publisher web interfaces using network segmentation and firewall rules, limiting exposure to trusted internal networks or VPNs only. 3) Enhance user training and awareness programs focusing on phishing and social engineering risks, emphasizing caution with unsolicited links or attachments. 4) Monitor Oracle security advisories for patches or updates addressing CVE-2024-20987 and prioritize timely application once available. 5) Implement robust logging and monitoring on BI Publisher servers to detect unusual data access or modification activities, enabling rapid incident response. 6) Employ multi-factor authentication (MFA) for accessing BI Publisher interfaces to reduce the risk of unauthorized access. 7) Review and tighten access controls and permissions within BI Publisher to ensure least privilege principles are enforced, minimizing potential damage from compromised accounts. 8) Conduct regular security assessments and penetration tests focusing on Oracle Analytics environments to identify and remediate related vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2023-12-07T22:28:10.640Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dbfa6182aa0cae249833e
Added to database: 6/2/2025, 3:13:42 PM
Last enriched: 7/3/2025, 4:11:00 PM
Last updated: 8/4/2025, 12:33:38 PM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.