CVE-2025-21560

6.5 MEDIUM

📋 TL;DR

This vulnerability in Oracle Agile PLM Framework allows authenticated attackers with low privileges to access sensitive data via HTTP. It affects organizations using Oracle Supply Chain products, specifically those running Agile PLM Framework version 9.3.6. Attackers can exploit this to read critical information they shouldn't have access to.

💻 Affected Systems

Products:
  • Oracle Agile PLM Framework
Versions: 9.3.6
Operating Systems: All supported platforms for Oracle Agile PLM
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the SDK-Software Development Kit component. Requires network access via HTTP and low privileged credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all sensitive data within Oracle Agile PLM Framework, including intellectual property, product designs, and supply chain information.

🟠

Likely Case

Unauthorized access to confidential business data, potentially leading to intellectual property theft or competitive advantage loss.

🟢

If Mitigated

Limited data exposure if proper access controls and network segmentation are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is network accessible via HTTP and requires only low privileges, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can exploit this, but network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes this as 'easily exploitable' and requires only low privileged access. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oracle Critical Patch Update for January 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2025.html

Restart Required: Yes

Instructions:

1. Review Oracle Critical Patch Update Advisory for January 2025. 2. Download and apply the appropriate patch from Oracle Support. 3. Restart affected Oracle Agile PLM services. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Oracle Agile PLM Framework to only trusted IP addresses and networks.

Privilege Reduction

all

Review and minimize low privilege user accounts and their access permissions within Oracle Agile PLM.

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP access to Oracle Agile PLM Framework
  • Enhance monitoring and logging of data access patterns within the application

🔍 How to Verify

Check if Vulnerable:

Check if Oracle Agile PLM Framework version is 9.3.6 and review Oracle advisory for specific component details.

Check Version:

Check Oracle Agile PLM administration console or consult Oracle documentation for version verification commands specific to your deployment.

Verify Fix Applied:

Verify patch installation through Oracle patch management tools and confirm version is updated beyond 9.3.6.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data access patterns by low privilege users
  • Multiple failed authentication attempts followed by successful data access

Network Indicators:

  • HTTP requests to Oracle Agile PLM SDK endpoints from unexpected sources

SIEM Query:

source="oracle-agile-plm" AND (event_type="data_access" OR event_type="authentication") AND user_privilege="low" AND data_sensitivity="high"

🔗 References

📤 Share & Export