CVE-2021-2137

8.8 HIGH

📋 TL;DR

This vulnerability in Oracle Enterprise Manager's Policy Framework allows authenticated attackers with low privileges to gain complete control over the Enterprise Manager Base Platform via HTTP. Affected versions are 13.4.0.0 and 13.5.0.0, putting organizations using these versions at risk of system takeover.

💻 Affected Systems

Products:
  • Oracle Enterprise Manager Base Platform
Versions: 13.4.0.0 and 13.5.0.0
Operating Systems: All platforms running affected Oracle Enterprise Manager versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Policy Framework component to be enabled, which is typically part of standard Enterprise Manager installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Enterprise Manager Base Platform leading to full administrative control, data exfiltration, and potential lateral movement to managed systems.

🟠

Likely Case

Attackers gain administrative privileges on Enterprise Manager, enabling them to modify policies, access sensitive configuration data, and potentially compromise managed Oracle databases and systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Enterprise Manager instance itself, though it remains a significant security breach.

🌐 Internet-Facing: HIGH - HTTP-accessible vulnerability with low privilege requirements makes internet-facing instances extremely vulnerable to exploitation.
🏢 Internal Only: HIGH - Even internally, low-privileged users or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes it as 'easily exploitable' with low privileged access via HTTP. No public exploit code is known, but the low complexity suggests weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update October 2021

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2021.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from My Oracle Support. 2. Apply the patch following Oracle's Enterprise Manager patching procedures. 3. Restart the Enterprise Manager services. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict HTTP access to Enterprise Manager to only trusted administrative networks

Configure firewall rules to limit access to Enterprise Manager ports (typically 7800-7802, 4889, 1159)

Privilege Reduction

all

Review and minimize low-privileged user accounts with HTTP access to Enterprise Manager

Review EM_USER and other low-privilege accounts in Enterprise Manager

🧯 If You Can't Patch

  • Isolate Enterprise Manager instance in a dedicated network segment with strict access controls
  • Implement additional authentication layers (2FA) for all Enterprise Manager access

🔍 How to Verify

Check if Vulnerable:

Check Enterprise Manager version via EM CLI: 'emctl status agent' or via Enterprise Manager console under Setup -> About

Check Version:

emctl status agent | grep Version

Verify Fix Applied:

Verify patch application via 'opatch lsinventory' and confirm version is no longer 13.4.0.0 or 13.5.0.0

📡 Detection & Monitoring

Log Indicators:

  • Unusual policy modifications
  • Unexpected privilege escalation events
  • Suspicious HTTP requests to Policy Framework endpoints

Network Indicators:

  • Unusual HTTP traffic patterns to Enterprise Manager from low-privileged user accounts
  • Policy-related API calls from unexpected sources

SIEM Query:

source="enterprise_manager" AND (event_type="policy_modification" OR event_type="privilege_change") AND user_privilege="low"

🔗 References

📤 Share & Export