CVE-2024-21287

7.5 HIGH

📋 TL;DR

This vulnerability in Oracle Agile PLM Framework allows unauthenticated attackers to remotely access sensitive data via HTTP. It affects organizations using Oracle Agile PLM Framework version 9.3.6 for supply chain management.

💻 Affected Systems

Products:
  • Oracle Agile PLM Framework
Versions: 9.3.6
Operating Systems: Not specified - likely cross-platform
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Software Development Kit and Process Extension components. Requires Oracle Agile PLM Framework installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all Oracle Agile PLM Framework accessible data including intellectual property, product designs, and supply chain information.

🟠

Likely Case

Unauthorized access to confidential product lifecycle management data, potentially exposing trade secrets and proprietary information.

🟢

If Mitigated

Limited data exposure if network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Unauthenticated network access via HTTP makes internet-facing systems extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oracle Critical Patch Update for specific version

Vendor Advisory: https://www.oracle.com/security-alerts/alert-cve-2024-21287.html

Restart Required: Yes

Instructions:

1. Apply the latest Oracle Critical Patch Update for Agile PLM. 2. Restart affected services. 3. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Oracle Agile PLM Framework to only trusted IP addresses

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="PORT" accept'
netsh advfirewall firewall add rule name="Restrict Agile PLM" dir=in action=allow protocol=TCP localport=PORT remoteip=TRUSTED_IP

Web Application Firewall

all

Deploy WAF with rules to block suspicious HTTP requests to Agile PLM endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted networks only
  • Monitor for unusual access patterns and data exfiltration attempts

🔍 How to Verify

Check if Vulnerable:

Check Oracle Agile PLM Framework version - if running 9.3.6, system is vulnerable

Check Version:

Check Oracle documentation for version query commands specific to Agile PLM installation

Verify Fix Applied:

Verify patch installation through Oracle patch management tools and confirm version is updated

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated HTTP requests to Agile PLM endpoints
  • Unusual data access patterns from unexpected IP addresses
  • Large data transfers from Agile PLM systems

Network Indicators:

  • HTTP traffic to Agile PLM from unauthorized sources
  • Unusual outbound data transfers

SIEM Query:

source="agile_plm_logs" AND (http_method=GET OR http_method=POST) AND user="anonymous" AND status=200

🔗 References

📤 Share & Export