CVE-2025-30751

8.8 HIGH

📋 TL;DR

This vulnerability in Oracle Database allows attackers with low privileges (Create Session and Create Procedure) to gain complete control over the database via network access. It affects Oracle Database Server versions 19.27 and 23.4-23.8, potentially leading to data theft, manipulation, and service disruption.

💻 Affected Systems

Products:
  • Oracle Database Server
Versions: 19.27 and 23.4-23.8
Operating Systems: All platforms running affected Oracle Database versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Create Session and Create Procedure privileges, which are commonly granted to application/service accounts.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, destruction, ransomware deployment, and persistent backdoor access.

🟠

Likely Case

Privilege escalation to DBA/SYSDBA level, enabling data theft, manipulation, and lateral movement within the database environment.

🟢

If Mitigated

Limited impact if network access is restricted and least privilege principles are strictly enforced.

🌐 Internet-Facing: HIGH - Network accessible vulnerability with low attack complexity and high impact.
🏢 Internal Only: HIGH - Even internal attackers with basic database privileges can exploit this for full compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes as 'easily exploitable' with low attack complexity. Requires authenticated access with specific privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update July 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2025.html

Restart Required: Yes

Instructions:

1. Download appropriate patch from My Oracle Support. 2. Apply patch following Oracle's patch installation procedures. 3. Restart database instances. 4. Test application functionality.

🔧 Temporary Workarounds

Restrict network access

all

Limit Oracle Net access to trusted IP addresses only

Use Oracle Net Manager or edit listener.ora to configure IP restrictions

Minimize privileges

all

Review and remove Create Procedure privilege from non-essential accounts

REVOKE CREATE PROCEDURE FROM <username>;
REVOKE CREATE ANY PROCEDURE FROM <username>;

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit database access
  • Apply principle of least privilege and audit all accounts with Create Procedure privilege

🔍 How to Verify

Check if Vulnerable:

Check Oracle Database version: SELECT * FROM v$version; If version is 19.27 or between 23.4-23.8, system is vulnerable.

Check Version:

SELECT banner FROM v$version WHERE banner LIKE 'Oracle Database%';

Verify Fix Applied:

Verify patch application: SELECT * FROM dba_registry_history WHERE action_time > [patch date]; Check version is no longer in vulnerable range.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CREATE PROCEDURE statements from low-privilege accounts
  • Suspicious privilege escalation attempts in audit logs

Network Indicators:

  • Unexpected Oracle Net connections to database from unauthorized sources

SIEM Query:

source="oracle_audit" AND (event="CREATE PROCEDURE" OR event="GRANT") AND user_privilege_level="LOW"

🔗 References

📤 Share & Export