CVE-2025-21564

8.1 HIGH

📋 TL;DR

This vulnerability in Oracle Agile PLM Framework allows authenticated attackers with low privileges to access sensitive data or cause denial of service via HTTP requests. It affects Oracle Supply Chain's Agile PLM Framework version 9.3.6, potentially exposing critical business data and disrupting operations.

💻 Affected Systems

Products:
  • Oracle Agile PLM Framework
Versions: 9.3.6
Operating Systems: All supported platforms for Oracle Agile PLM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Agile Integration Services component specifically; requires HTTP access to the PLM framework.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all accessible Oracle Agile PLM Framework data and sustained denial of service, causing business disruption and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive supply chain data and intermittent service disruptions affecting business operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially preventing exploitation entirely.

🌐 Internet-Facing: HIGH - Attackers can exploit via HTTP from anywhere if the service is exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers with low privileges can still exploit, but network segmentation reduces external threat surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CVSS indicates 'easily exploitable' with low attack complexity; requires low privileged account and network access via HTTP.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update January 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2025.html

Restart Required: Yes

Instructions:

1. Download appropriate patches from Oracle Support. 2. Apply patches to Oracle Agile PLM Framework 9.3.6 installations. 3. Restart affected services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict HTTP access to Oracle Agile PLM Framework to only trusted networks and users.

Configure firewall rules to limit access to Agile PLM services

Privilege Reduction

all

Review and minimize low-privilege user accounts with HTTP access to Agile PLM.

Audit user accounts and remove unnecessary low-privilege access

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP traffic to Agile PLM from trusted sources only.
  • Monitor for unusual access patterns or denial of service attempts against Agile PLM services.

🔍 How to Verify

Check if Vulnerable:

Check if Oracle Agile PLM Framework version is 9.3.6 and review patch status.

Check Version:

Check Oracle Agile PLM administration console or database for version information.

Verify Fix Applied:

Verify patch application from Oracle Critical Patch Update January 2025 and confirm version/component updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Agile Integration Services
  • Multiple failed or successful authentication attempts from low-privilege accounts
  • Service crash or hang logs

Network Indicators:

  • Abnormal HTTP traffic patterns to Agile PLM ports
  • Increased traffic volume indicating potential DoS attempts

SIEM Query:

source="agile_plm" AND (event_type="service_crash" OR http_status="500")

🔗 References

📤 Share & Export