CVE-2024-21233

4.3 MEDIUM

📋 TL;DR

This vulnerability allows low-privileged attackers with network access and Create Session privilege to modify data in Oracle Database Core. It affects Oracle Database Server versions 19.3-19.24, 21.3-21.15, and 23.4-23.5. Attackers can perform unauthorized insert, update, or delete operations on accessible data.

💻 Affected Systems

Products:
  • Oracle Database Server
Versions: 19.3-19.24, 21.3-21.15, 23.4-23.5
Operating Systems: All supported Oracle Database platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have Create Session privilege and network access via Oracle Net

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could corrupt or delete critical database data, potentially disrupting business operations or causing data integrity issues.

🟠

Likely Case

Attackers with legitimate low-privileged access could modify data they shouldn't have access to, potentially altering application data or configuration.

🟢

If Mitigated

With proper network segmentation and privilege controls, impact is limited to authorized users making unauthorized data modifications within their access scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes as 'easily exploitable' but requires authenticated access with Create Session privilege

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update October 2024

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2024.html

Restart Required: Yes

Instructions:

1. Download appropriate patch from My Oracle Support. 2. Apply patch following Oracle patch installation procedures. 3. Restart database instances. 4. Verify patch application.

🔧 Temporary Workarounds

Restrict network access

all

Limit Oracle Net access to trusted networks only

Configure firewall rules to restrict access to Oracle listener port (default 1521)

Minimize privileges

all

Review and reduce Create Session privileges to minimum necessary

REVOKE CREATE SESSION FROM <user>;
GRANT CREATE SESSION TO <user> ONLY WHERE NECESSARY;

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Oracle databases
  • Enforce principle of least privilege for all database users

🔍 How to Verify

Check if Vulnerable:

Check Oracle Database version: SELECT * FROM v$version; and compare with affected versions

Check Version:

SELECT banner FROM v$version WHERE banner LIKE 'Oracle%';

Verify Fix Applied:

Verify patch application: SELECT * FROM dba_registry_history WHERE action = 'APPLY'; and check for October 2024 patches

📡 Detection & Monitoring

Log Indicators:

  • Unusual data modification patterns from low-privileged users
  • Multiple failed privilege escalation attempts

Network Indicators:

  • Unusual Oracle Net connections from unexpected sources
  • Suspicious database modification traffic patterns

SIEM Query:

source="oracle_audit" action="UPDATE" OR action="INSERT" OR action="DELETE" user_privilege="LOW"

🔗 References

📤 Share & Export