CVE-2025-21558

5.4 MEDIUM

📋 TL;DR

This vulnerability in Oracle Primavera P6 Enterprise Project Portfolio Management allows authenticated attackers with low privileges to perform unauthorized data manipulation and read operations via HTTP. It affects web access components in specific versions and requires human interaction from someone other than the attacker to exploit. The vulnerability can impact additional products beyond Primavera P6 when successfully exploited.

💻 Affected Systems

Products:
  • Oracle Primavera P6 Enterprise Project Portfolio Management
Versions: 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0
Operating Systems: Not specified - web application vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Web Access component specifically. Requires HTTP network access and low privileged user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical project data, insert malicious content, delete important records, and exfiltrate sensitive project information, potentially disrupting enterprise project management operations.

🟠

Likely Case

Low-privileged users could escalate their access to modify or view project data they shouldn't have access to, leading to data integrity issues and unauthorized information disclosure.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minor data manipulation within the attacker's existing access scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access and human interaction from another user. Described as 'easily exploitable' by Oracle.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update Advisory - January 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2025.html

Restart Required: Yes

Instructions:

1. Review Oracle Critical Patch Update Advisory for January 2025. 2. Download appropriate patches for your Primavera P6 version. 3. Apply patches following Oracle's installation instructions. 4. Restart affected services. 5. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Primavera P6 web interface to only trusted IP addresses and networks

Privilege Reduction

all

Review and minimize low-privilege user accounts and implement principle of least privilege

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP access to Primavera P6 web interface
  • Enhance monitoring and logging for unauthorized data access and modification attempts

🔍 How to Verify

Check if Vulnerable:

Check Primavera P6 version against affected ranges: 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, or 22.12.1.0

Check Version:

Check Primavera P6 administration console or application logs for version information

Verify Fix Applied:

Verify version is updated beyond affected ranges and check Oracle patch installation logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual data modification patterns
  • Multiple failed access attempts followed by successful data operations
  • User accounts performing actions outside their normal scope

Network Indicators:

  • HTTP requests to Primavera P6 web interface with unusual parameters or patterns
  • Traffic from unexpected sources to the application

SIEM Query:

source="primavera_p6" AND (event_type="data_modification" OR event_type="unauthorized_access") AND user_privilege="low"

🔗 References

📤 Share & Export