CVE-2020-14608

8.2 HIGH

📋 TL;DR

This vulnerability in Oracle Fusion Middleware MapViewer allows unauthenticated attackers with network access via HTTP to compromise the system. Attackers can create, delete, or modify critical data and read some accessible data. Only version 12.2.1.3.0 of the MapViewer Tile Server component is affected.

💻 Affected Systems

Products:
  • Oracle Fusion Middleware MapViewer
Versions: 12.2.1.3.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only the Tile Server component is affected. Requires network access via HTTP to the MapViewer service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of MapViewer data integrity with unauthorized data modification/deletion and partial data exfiltration, potentially leading to service disruption or data corruption.

🟠

Likely Case

Unauthorized data manipulation and limited data exposure, potentially affecting map tile configurations and related middleware data.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Oracle describes this as 'easily exploitable' with no authentication required via HTTP.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Critical Patch Update for July 2020 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2020.html

Restart Required: Yes

Instructions:

1. Download the appropriate Critical Patch Update from Oracle Support. 2. Apply the patch following Oracle's middleware patching procedures. 3. Restart the MapViewer service and any dependent services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to MapViewer Tile Server to only trusted internal networks

Firewall Rules

all

Implement firewall rules to block external HTTP access to MapViewer ports

🧯 If You Can't Patch

  • Isolate the MapViewer server in a restricted network segment with no internet access
  • Implement strict access controls and monitor all HTTP traffic to the MapViewer service

🔍 How to Verify

Check if Vulnerable:

Check Oracle Fusion Middleware version and MapViewer component version. If running 12.2.1.3.0 with Tile Server enabled, the system is vulnerable.

Check Version:

Check Oracle documentation for version verification commands specific to your installation

Verify Fix Applied:

Verify that the July 2020 Critical Patch Update or later has been applied and MapViewer service has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to MapViewer endpoints
  • Unauthorized data modification attempts in MapViewer logs
  • Unexpected tile server configuration changes

Network Indicators:

  • HTTP traffic to MapViewer from unexpected sources
  • Unusual patterns in MapViewer API calls

SIEM Query:

Search for HTTP requests to MapViewer endpoints from external IP addresses or unusual user agents

🔗 References

📤 Share & Export