CVE-2021-2351

8.3 HIGH

📋 TL;DR

This vulnerability in Oracle Database's Advanced Networking Option allows attackers to bypass network encryption protections and potentially compromise the component. It affects Oracle Database Server versions 12.1.0.2, 12.2.0.1, and 19c with Advanced Networking Option enabled. Successful exploitation requires network access via Oracle Net and human interaction from someone other than the attacker.

💻 Affected Systems

Products:
  • Oracle Database Server with Advanced Networking Option
Versions: 12.1.0.2, 12.2.0.1, 19c
Operating Systems: All platforms running affected Oracle Database versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Advanced Networking Option to be enabled and configured with vulnerable cipher settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of the Advanced Networking Option component, potentially leading to full database compromise, data exfiltration, and system control.

🟠

Likely Case

Bypass of network encryption protections, allowing attackers to intercept or manipulate database communications.

🟢

If Mitigated

Limited impact with proper network segmentation, encryption enforcement, and updated cipher configurations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires human interaction (social engineering) and specific network conditions. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2021 Critical Patch Update and later

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2022.html

Restart Required: Yes

Instructions:

1. Apply Oracle Critical Patch Update from July 2021 or later. 2. Review and implement Native Network Encryption changes per Oracle Doc ID 2791571.1. 3. Restart database services.

🔧 Temporary Workarounds

Disable weak ciphers

all

Configure Native Network Encryption to use only strong ciphers and disable vulnerable cipher suites.

SQL> ALTER SYSTEM SET SQLNET.ENCRYPTION_TYPES_SERVER = (AES256) SCOPE=BOTH;
SQL> ALTER SYSTEM SET SQLNET.ENCRYPTION_TYPES_CLIENT = (AES256) SCOPE=BOTH;

Network segmentation

all

Restrict network access to Oracle Database ports (typically 1521) to trusted sources only.

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules to limit Oracle Net connections
  • Enable comprehensive logging and monitoring for unusual database network activity

🔍 How to Verify

Check if Vulnerable:

Check Oracle Database version and patch level: SQL> SELECT * FROM v$version; and SQL> SELECT * FROM dba_registry_history;

Check Version:

SQL> SELECT banner FROM v$version WHERE banner LIKE 'Oracle%';

Verify Fix Applied:

Verify patch applied: SQL> SELECT comments FROM dba_registry_history WHERE action_time > '01-JUL-2021'; and check cipher configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network encryption negotiation failures
  • Multiple connection attempts with different cipher suites
  • Oracle Net protocol anomalies

Network Indicators:

  • Unusual traffic patterns on Oracle Net ports
  • Attempts to negotiate weak encryption ciphers
  • Suspicious database connection attempts

SIEM Query:

source="oracle_audit.log" AND (event="NETWORK_ENCRYPTION_FAILURE" OR cipher_suite="*weak*")

🔗 References

📤 Share & Export