CVE-2025-21562

4.3 MEDIUM

📋 TL;DR

This vulnerability in Oracle PeopleSoft Enterprise CC Common Application Objects allows authenticated attackers with low privileges to read sensitive data via HTTP requests. It affects PeopleSoft Enterprise CC Common Application Objects version 9.2. The vulnerability enables unauthorized access to a subset of PeopleSoft data.

💻 Affected Systems

Products:
  • Oracle PeopleSoft Enterprise CC Common Application Objects
Versions: 9.2
Operating Systems: Any OS running PeopleSoft
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PeopleSoft Enterprise CC Common Application Objects component specifically. Requires PeopleSoft installation with Run Control Management component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive business data, customer information, or configuration details from PeopleSoft systems, potentially leading to data breaches and compliance violations.

🟠

Likely Case

Low-privileged users or compromised accounts accessing confidential PeopleSoft data they shouldn't have permission to view, potentially exposing sensitive business information.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users accessing data within their normal scope, though still represents a privilege escalation risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but with low privileges. Exploitation likely involves HTTP requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Oracle Critical Patch Update for January 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2025.html

Restart Required: Yes

Instructions:

1. Review Oracle Critical Patch Update Advisory for January 2025. 2. Download appropriate PeopleSoft patch from Oracle Support. 3. Apply patch following Oracle PeopleSoft patching procedures. 4. Restart PeopleSoft services as required.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to PeopleSoft systems to only trusted IP addresses and networks

Principle of Least Privilege

all

Review and minimize user privileges in PeopleSoft, ensuring users only have access necessary for their roles

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to PeopleSoft systems
  • Enhance monitoring and logging of PeopleSoft access patterns and data queries

🔍 How to Verify

Check if Vulnerable:

Check PeopleSoft version and patch level. If running PeopleSoft Enterprise CC Common Application Objects 9.2 without January 2025 Critical Patch Update, system is vulnerable.

Check Version:

Check PeopleSoft version through PeopleTools or PeopleSoft administration console

Verify Fix Applied:

Verify patch application through PeopleSoft patch management tools and confirm version/patch level post-update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data access patterns from low-privileged accounts
  • Multiple failed authorization attempts followed by successful data queries

Network Indicators:

  • HTTP requests to PeopleSoft Run Control Management endpoints from unexpected sources

SIEM Query:

source="peoplesoft" AND (event_type="data_access" OR event_type="authorization") AND user_privilege="low" AND result="success"

🔗 References

📤 Share & Export