CVE-2024-21191
📋 TL;DR
This vulnerability in Oracle Enterprise Manager Fusion Middleware Control allows authenticated attackers with low privileges to gain unauthorized access to sensitive data or modify data through HTTP requests. It affects organizations running Oracle Fusion Middleware 12.2.1.4.0 with the FMW Control Plugin. Successful exploitation requires human interaction from someone other than the attacker.
💻 Affected Systems
- Oracle Enterprise Manager Fusion Middleware Control
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Oracle Enterprise Manager Fusion Middleware Control data, unauthorized access to critical information across connected systems, and data manipulation affecting additional products due to scope change.
Likely Case
Unauthorized access to sensitive configuration data, credentials, or operational information within the Enterprise Manager environment, potentially leading to further lateral movement.
If Mitigated
Limited impact with proper network segmentation, strong authentication controls, and monitoring that detects unusual access patterns from low-privileged accounts.
🎯 Exploit Status
Easily exploitable by low-privileged attackers with network access via HTTP, but requires human interaction from another person.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patch from Oracle Critical Patch Update October 2024
Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2024.html
Restart Required: Yes
Instructions:
1. Download the appropriate patch from My Oracle Support. 2. Apply the patch following Oracle's patching procedures. 3. Restart affected services. 4. Verify the patch was applied successfully.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to Oracle Enterprise Manager Fusion Middleware Control to trusted IP addresses only
# Use firewall rules to limit access
# Example: iptables -A INPUT -p tcp --dport <port> -s <trusted_ip> -j ACCEPT
Privilege Reduction
allReview and minimize low-privileged user accounts with access to the affected component
# Review user permissions in Oracle EM
# Remove unnecessary low-privileged accounts
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the affected system from untrusted networks
- Enhance monitoring and alerting for unusual access patterns from low-privileged accounts
🔍 How to Verify
Check if Vulnerable:
Check Oracle Enterprise Manager version and verify if running 12.2.1.4.0 with FMW Control Plugin
Check Version:
emctl status oms -details | grep Version
Verify Fix Applied:
Verify patch application through Oracle Enterprise Manager console or check version after patching
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests from low-privileged accounts
- Failed authentication attempts followed by successful access
- Access to sensitive data endpoints from unexpected sources
Network Indicators:
- HTTP traffic to Oracle EM endpoints from unauthorized sources
- Unusual data exfiltration patterns
SIEM Query:
source="oracle_em" AND (event_type="data_access" OR event_type="configuration_change") AND user_privilege="low" AND result="success"