CVE-2022-21516

7.3 HIGH

📋 TL;DR

An unauthenticated attacker can exploit this vulnerability in Oracle Enterprise Manager Base Platform via HTTP to partially modify or delete data, read restricted information, and cause partial denial of service. This affects Enterprise Manager versions 13.4.0.0 and 13.5.0.0 with network access to the vulnerable component.

💻 Affected Systems

Products:
  • Oracle Enterprise Manager Base Platform
Versions: 13.4.0.0 and 13.5.0.0
Operating Systems: All supported platforms for Oracle Enterprise Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Enterprise Manager Install component specifically. Requires HTTP network access to the Enterprise Manager instance.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Enterprise Manager data integrity and availability, with potential lateral movement to managed systems.

🟠

Likely Case

Unauthorized data manipulation, information disclosure, and service disruption affecting monitoring and management capabilities.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Unauthenticated network attack vector with low complexity makes internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to the Enterprise Manager instance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Oracle describes this as 'easily exploitable' with CVSS attack complexity 'Low'. No public exploit code is known as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update July 2022

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2022.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from My Oracle Support. 2. Apply the patch following Oracle Enterprise Manager patching procedures. 3. Restart the Enterprise Manager services. 4. Verify the patch application was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Enterprise Manager instances to trusted IP addresses only

# Example firewall rule (Linux): iptables -A INPUT -p tcp --dport <em_port> -s <trusted_ip> -j ACCEPT
# Example firewall rule (Windows): New-NetFirewallRule -DisplayName 'Restrict EM Access' -Direction Inbound -LocalPort <em_port> -Protocol TCP -RemoteAddress <trusted_ip> -Action Allow

Access Control Lists

all

Implement network ACLs to limit HTTP access to Enterprise Manager web interface

# Configure web server (e.g., Apache) to restrict access: Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Isolate Enterprise Manager instances behind firewalls with strict IP-based access controls
  • Implement network monitoring and intrusion detection for anomalous HTTP traffic to Enterprise Manager ports

🔍 How to Verify

Check if Vulnerable:

Check Enterprise Manager version via command: emctl status agent -details | grep 'Version'

Check Version:

emctl status agent -details | grep 'Version'

Verify Fix Applied:

Verify patch application via: opatch lsinventory | grep -i 'Enterprise Manager' and check version is no longer 13.4.0.0 or 13.5.0.0

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Enterprise Manager Install endpoints
  • Failed authentication attempts followed by successful data manipulation
  • Unexpected service restarts or availability issues

Network Indicators:

  • Unusual HTTP traffic patterns to Enterprise Manager ports (typically 7800-7802, 4889)
  • External IP addresses accessing Enterprise Manager from untrusted networks

SIEM Query:

source="enterprise_manager.log" AND (http_status=200 AND http_method=POST AND uri CONTAINS "/install/") NOT src_ip IN (trusted_networks)

🔗 References

📤 Share & Export