CVE-2024-21095
📋 TL;DR
This vulnerability in Oracle Primavera P6 Enterprise Project Portfolio Management allows unauthenticated attackers with network access via HTTP to access sensitive data and modify some data. It affects multiple versions of the Web Access component across releases 19.12.0 through 23.12.2. The vulnerability has high confidentiality and integrity impacts with a CVSS score of 8.2.
💻 Affected Systems
- Oracle Primavera P6 Enterprise Project Portfolio Management
📦 What is this software?
Primavera P6 Enterprise Project Portfolio Management by Oracle
View all CVEs affecting Primavera P6 Enterprise Project Portfolio Management →
Primavera P6 Enterprise Project Portfolio Management by Oracle
View all CVEs affecting Primavera P6 Enterprise Project Portfolio Management →
Primavera P6 Enterprise Project Portfolio Management by Oracle
View all CVEs affecting Primavera P6 Enterprise Project Portfolio Management →
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of all Primavera P6 accessible data including critical project portfolio information, financial data, and unauthorized modifications to project records.
Likely Case
Unauthorized access to sensitive project data, exposure of confidential business information, and potential data manipulation affecting project integrity.
If Mitigated
Limited impact through network segmentation and access controls, but still potential for data exposure if perimeter defenses are breached.
🎯 Exploit Status
Oracle describes it as 'easily exploitable' with no authentication required via HTTP. No public exploit code is known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches from Oracle Critical Patch Update April 2024
Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2024.html
Restart Required: Yes
Instructions:
1. Download appropriate patches from Oracle Support. 2. Apply patches according to Oracle documentation. 3. Restart Primavera P6 services. 4. Verify patch application through version checks.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Primavera P6 Web Access to only trusted IP addresses
Web Application Firewall
allImplement WAF rules to block suspicious HTTP requests to Primavera P6 endpoints
🧯 If You Can't Patch
- Isolate Primavera P6 Web Access behind VPN or zero-trust network access
- Implement strict network access controls and monitor all traffic to Primavera P6 endpoints
🔍 How to Verify
Check if Vulnerable:
Check Primavera P6 version against affected ranges. Review system logs for unauthorized access attempts.
Check Version:
Check Primavera P6 version through administrative interface or application logs
Verify Fix Applied:
Verify version is updated beyond affected ranges. Test that unauthenticated HTTP requests no longer return sensitive data.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated HTTP requests accessing sensitive endpoints
- Unusual data access patterns from unfamiliar IP addresses
Network Indicators:
- HTTP traffic to Primavera P6 from unauthorized sources
- Unusual data volumes being transferred
SIEM Query:
source="primavera-p6" AND (http_status=200 OR http_status=302) AND user="anonymous" AND (uri CONTAINS "/data" OR uri CONTAINS "/api")