Skip to main content

CVE-2024-20987: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. in Oracle Corporation BI Publisher (formerly XML Publisher)

Medium
VulnerabilityCVE-2024-20987cvecve-2024-20987
Published: Tue Jan 16 2024 (01/16/2024, 21:41:26 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: BI Publisher (formerly XML Publisher)

Description

Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/03/2025, 16:11:00 UTC

Technical Analysis

CVE-2024-20987 is a medium-severity vulnerability affecting Oracle BI Publisher version 12.2.1.4.0, a component of Oracle Analytics responsible for generating and managing business reports. The vulnerability resides in the web server component and allows a low-privileged attacker with network access via HTTP to compromise the system. Exploitation requires user interaction from a person other than the attacker, indicating a social engineering element such as tricking a user into clicking a malicious link or opening a crafted file. The vulnerability has a CVSS 3.1 base score of 5.4, reflecting moderate risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to unauthorized read access to some data and unauthorized update, insert, or delete operations on Oracle BI Publisher accessible data. This implies an attacker could manipulate report data or extract sensitive information, potentially impacting data integrity and confidentiality but not availability. The vulnerability's impact extends beyond BI Publisher itself, potentially affecting other integrated Oracle products due to the scope change. No known exploits are currently reported in the wild, but the ease of exploitation and network accessibility make it a significant concern. The lack of a patch link suggests that organizations should monitor Oracle advisories closely for updates. Given the requirement for user interaction and low privileges, social engineering combined with network access is the likely attack path.

Potential Impact

For European organizations, the impact of CVE-2024-20987 could be substantial, especially for those relying on Oracle BI Publisher for critical reporting and analytics functions. Unauthorized data manipulation could lead to inaccurate business intelligence, affecting decision-making processes and compliance reporting. Confidentiality breaches could expose sensitive business or personal data, potentially violating GDPR and other data protection regulations, leading to legal and financial penalties. The scope change indicates that exploitation might compromise additional Oracle products integrated with BI Publisher, amplifying the risk across enterprise systems. Organizations in sectors such as finance, healthcare, government, and manufacturing—where Oracle Analytics is commonly deployed—may face operational disruptions and reputational damage. The requirement for user interaction means that phishing or social engineering campaigns could be leveraged to trigger exploitation, necessitating heightened user awareness. Although no active exploits are reported, the medium severity and ease of network access warrant proactive risk management to prevent potential data breaches and integrity violations.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Immediately identify and inventory all Oracle BI Publisher 12.2.1.4.0 instances within their environment. 2) Restrict network access to BI Publisher web interfaces using network segmentation and firewall rules, limiting exposure to trusted internal networks or VPNs only. 3) Enhance user training and awareness programs focusing on phishing and social engineering risks, emphasizing caution with unsolicited links or attachments. 4) Monitor Oracle security advisories for patches or updates addressing CVE-2024-20987 and prioritize timely application once available. 5) Implement robust logging and monitoring on BI Publisher servers to detect unusual data access or modification activities, enabling rapid incident response. 6) Employ multi-factor authentication (MFA) for accessing BI Publisher interfaces to reduce the risk of unauthorized access. 7) Review and tighten access controls and permissions within BI Publisher to ensure least privilege principles are enforced, minimizing potential damage from compromised accounts. 8) Conduct regular security assessments and penetration tests focusing on Oracle Analytics environments to identify and remediate related vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.640Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae249833e

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 4:11:00 PM

Last updated: 8/4/2025, 12:33:38 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats