We’re sorry. We could not find a match for your search.
We suggest you try the following to help find what you’re looking for:
Check the spelling of your keyword search.
Use synonyms for the keyword you typed, for example, try "application" instead of "software."
Start a new search.
Oracle Critical Patch Update Advisory - October 2022
Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities.
These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products.
These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches.
Refer to
“Critical Patch Updates, Security Alerts and Bulletins”
for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 370 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at
October 2022 Critical Patch Update: Executive Summary and Analysis
.
Affected Products and Patch Information
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
Application Management Pack for Oracle E-Business Suite, version 13.4.1.0.0
Oracle E-Business Suite
Big Data Spatial and Graph
Database
Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0
Enterprise Manager
Enterprise Manager for Virtualization, versions 13.4.0.0, 13.5.0.0
Enterprise Manager
Enterprise Manager Ops Center, version 12.4.0.0
Enterprise Manager
JD Edwards EnterpriseOne Orchestrator, versions 9.2.6.4 and prior
JD Edwards
JD Edwards EnterpriseOne Tools, versions 9.2.6.4 and prior
JD Edwards
MySQL Connectors, versions 8.0.30 and prior
MySQL
MySQL Enterprise Backup, versions 4.1.4 and prior
MySQL
MySQL Enterprise Monitor, versions 8.0.31 and prior
MySQL
MySQL Installer, versions 1.6.3 and prior
MySQL
MySQL Server, versions 5.7.39 and prior, 8.0.30 and prior
MySQL
MySQL Shell, versions 8.0.30 and prior
MySQL
MySQL Workbench, versions 8.0.30 and prior
MySQL
Oracle Access Manager, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Agile Engineering Data Management, version 6.2.1.0
Oracle Supply Chain Products
Oracle Agile PLM, version 9.3.6
Oracle Supply Chain Products
Oracle Airlines Data Model
Oracle Airlines Data Model
Oracle Application Express
Database
Oracle AutoVue, version 21.0.2
Oracle Supply Chain Products
Oracle Autovue for Agile Product Lifecycle Management, version 21.0.2
Oracle Supply Chain Products
Oracle Banking Enterprise Default Management, version 2.12.0
Oracle Banking Platform
Oracle Banking Loans Servicing, versions 2.8.0, 2.12.0
Contact Support
Oracle Banking Party Management, version 2.7.0
Oracle Banking Platform
Oracle Banking Platform, versions 2.7.1, 2.9.0, 2.12.0
Oracle Banking Platform
Oracle BI Publisher, versions 5.9.0.0, 6.4.0.0.0, 12.2.1.3.0, 12.2.1.4.0
Oracle Analytics
Oracle Business Activity Monitoring(Oracle BAM), versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Business Intelligence Enterprise Edition, versions 5.9.0.0, 6.4.0.0
Oracle Analytics
Oracle Business Process Management Suite, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Coherence, versions 12.2.1.4.0, 14.1.1.0.0
Fusion Middleware
Oracle Commerce Platform, versions 11.3.0-11.3.2
Oracle Commerce
Oracle Communications Billing and Revenue Management, versions 12.0.0.4.0-12.0.0.7.0
Oracle Communications Billing and Revenue Management
Oracle Communications Cloud Native Core Binding Support Function, version 22.3.0
Oracle Communications Cloud Native Core Binding Support Function
Oracle Communications Cloud Native Core Console, version 22.2.0
Oracle Communications Cloud Native Core Console
Oracle Communications Cloud Native Core Network Exposure Function, versions 22.2.1, 22.3.0
Oracle Communications Cloud Native Core Network Exposure Function
Oracle Communications Cloud Native Core Network Function Cloud Native Environment, versions 1.9.0, 22.1, 22.1.0, 22.2, 22.2.0, 22.2.1
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Oracle Communications Cloud Native Core Network Repository Function, version 22.2.2
Oracle Communications Cloud Native Core Network Repository Function
Oracle Communications Cloud Native Core Policy, version 22.3.0
Oracle Communications Cloud Native Core Policy
Oracle Communications Cloud Native Core Security Edge Protection Proxy, versions 22.1.1, 22.2.0, 22.2.1, 22.3.0
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Oracle Communications Cloud Native Core Service Communication Proxy, versions 22.2.3, 22.3.1, 22.4.0
Oracle Communications Cloud Native Core Service Communication Proxy
Oracle Communications Cloud Native Core Unified Data Repository, versions 22.1.1, 22.2.1, 22.3.0
Oracle Communications Cloud Native Core Unified Data Repository
Oracle Communications Converged Application Server - Service Controller, version 6.2
Oracle Communications Converged Application Server - Service Controller
Oracle Communications Convergence, version 3.0.3.0
Oracle Communications Convergence
Oracle Communications Convergent Charging Controller, versions 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0
Oracle Communications Convergent Charging Controller
Oracle Communications Data Model, version 12.2.0.1
Oracle Communications Data Model
Oracle Communications Design Studio, version 7.4.2
Oracle Communications Design Studio
Oracle Communications Diameter Signaling Router, version 8.6.0.0
Oracle Communications Diameter Signaling Router
Oracle Communications Element Manager, version 9.0
Oracle Communications Element Manager
Oracle Communications Evolved Communications Application Server, version 7.1
Oracle Communications Evolved Communications Application Server
Oracle Communications Instant Messaging Server, version 10.0.1.6.0
Oracle Communications Instant Messaging Server
Oracle Communications Interactive Session Recorder, version 6.4
Oracle Communications Interactive Session Recorder
Oracle Communications Messaging Server, version 8.1
Oracle Communications Messaging Server
Oracle Communications MetaSolv Solution, version 6.3.1
Oracle Communications MetaSolv Solution
Oracle Communications Network Charging and Control, versions 6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0
Oracle Communications Network Charging and Control
Oracle Communications Order and Service Management, versions 7.3, 7.4
Oracle Communications Order and Service Management
Oracle Communications Policy Management, version 12.6.0.0.0
Oracle Communications Policy Management
Oracle Communications Pricing Design Center, versions 12.0.0.4.0-12.0.0.7.0
Oracle Communications Pricing Design Center
Oracle Communications Services Gatekeeper, version 7.0.0.0.0
Oracle Communications Services Gatekeeper
Oracle Communications Session Border Controller, versions 8.4, 9.0, 9.1
Oracle Communications Session Border Controller
Oracle Communications Session Report Manager, version 9.0
Oracle Communications Session Report Manager
Oracle Communications Unified Assurance, versions prior to 5.5.7.0.0, 6.0.0.0.0
Oracle Communications Unified Assurance
Oracle Communications User Data Repository, versions 12.4.0, 12.6.0, 12.6.1
Oracle Communications User Data Repository
Oracle Communications WebRTC Session Controller, versions 7.2.0, 7.2.1
Oracle Communications WebRTC Session Controller
Oracle Data Integrator, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Database Server, versions 19c, 21c
Database
Oracle Documaker Enterprise Edition, versions 12.6-12.7
Oracle Insurance Applications
Oracle E-Business Suite, versions 12.2.3-12.2.11
Oracle E-Business Suite
Oracle Enterprise Data Quality, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Enterprise Operations Monitor, versions 4.4, 5.0
Oracle Enterprise Operations Monitor
Oracle Essbase, version 21.3
Database
Oracle Financial Services Analytical Applications Infrastructure, versions 8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1
Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Behavior Detection Platform, versions 8.0.7.2, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2
Oracle Financial Services Behavior Detection Platform
Oracle Financial Services Enterprise Case Management, versions 8.0.7.3, 8.0.8.2, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2
Oracle Financial Services Enterprise Case Management
Oracle Financial Services Model Management and Governance, versions 8.0.8.0, 8.1.0.0, 8.1.1.0
Oracle Financial Services Model Management and Governance
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition, versions 8.0.7.0, 8.0.8.0
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition
Oracle GoldenGate, version 19c
Database
Oracle GraalVM Enterprise Edition, versions 20.3.7, 21.3.3, 22.2.0
Java SE
Oracle Healthcare Data Repository, versions 8.1.1, 8.1.2, 8.1.3
HealthCare Applications
Oracle Healthcare Foundation, versions 8.1, 8.2
HealthCare Applications
Oracle Healthcare Master Person Index, versions 5.0.0-5.0.3
HealthCare Applications
Oracle Healthcare Translational Research, version 4.1
HealthCare Applications
Oracle Hospitality Cruise Fleet Management System, version 9.1.5
Oracle Hospitality Cruise Fleet Management
Oracle Hospitality Cruise Shipboard Property Management System, versions 20.2.0, 20.2.2
Oracle Hospitality Cruise Shipboard Property Management System
Oracle Hospitality Suite8, versions 8.10.2, 8.11.0, 8.12.0, 8.13.0, 8.14.0
Oracle Hospitality Suite8
Oracle HTTP Server, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Hyperion Infrastructure Technology, version 11.2.9
Oracle Enterprise Performance Management
Oracle Identity Management Suite, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Insurance Insbridge Rating and Underwriting, versions 5.2.0, 5.4.0-5.6.2
Oracle Insurance Applications
Oracle Java SE, versions 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19
Java SE
Oracle MapViewer, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Middleware Common Libraries and Tools, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle NoSQL Database
NoSQL Database
Oracle Outside In Technology, version 8.5.6
Fusion Middleware
Oracle Retail Assortment Planning, version 16.0.3
Retail Applications
Oracle Retail Back Office, version 14.1
Retail Applications
Oracle Retail Central Office, version 14.1
Retail Applications
Oracle Retail Customer Insights, versions 15.0.2, 15.2, 16.0.2
Retail Applications
Oracle Retail Customer Management and Segmentation Foundation, versions 17.0, 18.0, 19.0
Retail Applications
Oracle Retail EFTLink, versions 20.0.1, 21.0.0
Retail Applications
Oracle Retail Fiscal Management, version 14.2
Retail Applications
Oracle Retail Merchandising System, versions 14.1.3.2, 15.0.3.1, 19.0.1
Retail Applications
Oracle Retail Point Of Service, version 14.1
Retail Applications
Oracle Retail Predictive Application Server, versions 14.1.3.47, 15.0.3.116, 16.0.3.260
Retail Applications
Oracle Retail Returns Management, version 14.1
Retail Applications
Oracle Retail Sales Audit, version 19.0.1
Retail Applications
Oracle Retail Service Backbone, versions 14.1.3.2, 15.0.3.1, 16.0.3
Retail Applications
Oracle SD-WAN Aware, version 9.0.1.3.0
Oracle SD-WAN Aware
Oracle SD-WAN Edge, versions 7.0.7, 9.1.1.2.0
Oracle SD-WAN Edge
Oracle Secure Backup, versions prior to 18.1.0.2.0
Oracle Secure Backup
Oracle SOA Suite, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle Solaris, version 11
Systems
Oracle Solaris Cluster, version 4
Systems
Oracle SQL Developer
Database
Oracle TimesTen In-Memory Database
Database
Oracle Transportation Management, versions 6.4.3, 6.5.1
Oracle Supply Chain Products
Oracle Utilities Testing Accelerator, versions 6.0.0.1.3, 6.0.0.2.4, 6.0.0.3.3, 7.0.0.0.0
Oracle Utilities Applications
Oracle VM VirtualBox, versions prior to 6.1.40
Virtualization
Oracle WebCenter Content, version 12.2.1.3.0
Fusion Middleware
Oracle WebCenter Portal, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle WebCenter Sites, versions 12.2.1.3.0, 12.2.1.4.0
Fusion Middleware
Oracle WebLogic Server, versions 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
Fusion Middleware
PeopleSoft Enterprise Common Components, version 9.2
PeopleSoft
PeopleSoft Enterprise PeopleTools, versions 8.58, 8.59, 8.60
PeopleSoft
Primavera Gateway, versions 18.8.0-18.8.15, 19.12.0-19.12.14, 20.12.0-20.12.9, 21.12.0-21.12.7
Oracle Construction and Engineering Suite
Primavera Unifier, versions 18.8, 19.12, 20.12, 21.12
Oracle Construction and Engineering Suite
Siebel Applications, versions 22.8 and prior
Siebel
Note:
Vulnerabilities affecting Oracle Solaris may affect Oracle ZFSSA so Oracle customers should refer to the Oracle and Sun Systems Product Suite Critical Patch Update Knowledge Document,
My Oracle Support Note 2160904.1
for information on minimum revisions of security patches required to resolve ZFSSA issues published in Critical Patch Updates and Solaris Third Party bulletins.
Solaris Third Party Bulletins are used to announce security patches for third party software distributed with Oracle Solaris. Solaris 10 customers should refer to the latest patch-sets which contain critical security patches detailed in Systems Patch Availability Document. Please see Reference Index of CVE IDs and Solaris Patches (
My Oracle Support Note 1448883.1
) for more information.
Users running Java SE with a browser can download the latest release from
https://java.com
. Users on the Windows and Mac OS X platforms can also use
automatic updates
to get the latest release.
Risk Matrix Content
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in
previous Critical Patch Update advisories and Alerts
. An English text version of the risk matrices provided in this document is
here
.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a
CVE#
. A vulnerability that affects multiple products will appear with the same CVE# in all risk matrices.
Security vulnerabilities are scored using CVSS version 3.1 (see
Oracle CVSS Scoring
for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about the type of vulnerability, the conditions required to exploit it, and the potential impact of a successful exploit. Oracle provides this information, in part, so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see
Oracle vulnerability disclosure policies
.
Oracle lists updates that address vulnerabilities in third-party components that are not exploitable in the context of their inclusion in their respective Oracle product beneath the product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants (if applicable) are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS (if applicable) is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the
only
variant affected, e.g. HTTPS will typically be listed for vulnerabilities in SSL and TLS.
Workarounds
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible
. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Skipped Critical Patch Updates
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review
previous Critical Patch Update advisories
to determine appropriate actions.
Critical Patch Update Supported Products and Versions
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the
Lifetime Support Policy
. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy explained in
My Oracle Support Note 209768.1
. Please review the
Technical Support Policies
for further guidelines regarding support policies and phases of support.
Credit Statement
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
4ra1n of Chaitin Tech: CVE-2022-21598, CVE-2022-21616, CVE-2022-21622, CVE-2022-21623
Anonymous researcher working with Trend Micro's Zero Day Initiative: CVE-2022-39412
Billy Jheng Bing-Jhong (st424204) working with Trend Micro Zero Day Initiative: CVE-2022-39422, CVE-2022-39423
Christine Joy Infante of Vantage Point Security Pte. Ltd: CVE-2022-21612, CVE-2022-21613, CVE-2022-21614, CVE-2022-21615
Dohyun Lee (l33d0hyun) of SecuriTeam Secure Disclosure Labs: CVE-2022-39421
Eddie Zhu of Beijing DBSEC Technology Co., Ltd: CVE-2022-21596
Exist (exist91240480) working with Trend Micro Zero Day Initiative: CVE-2022-39427
George R: CVE-2022-21592
Hangfan Zhang: CVE-2022-21594
Houssam Sahli of Red Canari: CVE-2022-21629, CVE-2022-21630, CVE-2022-21631
kn32 working with Trend Micro Zero Day Initiative: CVE-2022-39424, CVE-2022-39425, CVE-2022-39426
Kun Yang of Chaitin Security Research Lab: CVE-2022-21620, CVE-2022-21621, CVE-2022-21627
l1k3beef: CVE-2022-21587
Lu Yu of Chaitin Security Research Lab: CVE-2022-21620, CVE-2022-21621, CVE-2022-21627
Ninad from bugcrowd ASG team: CVE-2022-21606
Ruhai Zhang of Beijing DBSEC Technology Co., Ltd: CVE-2022-21608
Rui Zhong: CVE-2022-21594
Samuel Tan of Vantage Point Security Pte. Ltd: CVE-2022-21612, CVE-2022-21613, CVE-2022-21614, CVE-2022-21615
Y4tacker: CVE-2022-21616
ycdxsb of VARAS@IIE: CVE-2022-39402, CVE-2022-39403, CVE-2022-39404
Yongheng Chen: CVE-2022-21594
Zu-Ming Jiang: CVE-2022-21607
Security-In-Depth Contributors
Oracle acknowledges people who have contributed to our Security-In-Depth program (see
FAQ
). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
4ra1n of Chaitin Tech
Emad Al-Mousa of Saudi Aramco [3 reports]
John Jiang of Tencent
Matt Luscombe
Motasim Taha
Nikhil Rathore
Sai Gopal
Xuelei Fan
ycdxsb of VARAS@IIE
On-Line Presence Security Contributors
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see
FAQ
). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
Abdalrahman Ali
Abdlallah Mohammed
Ahmed Al-Saleem
Chester van den Bogaard
Dexter Rim
Hassam
Jan Kopřiva of Nettles Consulting
Jil Hirenkumar Shah
Parag Bagul
Pratik Shetty
Raguraman R
Rasel Mir (araselmir)
Secure Web
Yagnik Bhuva
Critical Patch Update Schedule
Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:
17 January 2023
18 April 2023
18 July 2023
17 October 2023
References
Oracle Critical Patch Updates, Security Alerts and Bulletins
Critical Patch Update - October 2022 Documentation Map
Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions
Risk Matrix Definitions
Use of Common Vulnerability Scoring System (CVSS) by Oracle
English text version of the risk matrices
CVRF XML version of the risk matrices
CSAF JSON version of the risk matrices
Map of CVE to Advisory/Alert
Oracle Lifetime support Policy
JEP 290 Reference Blocklist Filter
Modification History
Oracle Database Products Risk Matrices
This Critical Patch Update contains 14 new security patches for Oracle Database Products divided as follows:
8 new security patches for Oracle Database Products
No new security patches for Oracle Airlines Data Model
, but third party patches are provided
No new security patches for Oracle Big Data Graph
, but third party patches are provided
1 new security patch for Oracle Communications Data Model
2 new security patches for Oracle Essbase
2 new security patches for Oracle GoldenGate
No new security patches for Oracle NoSQL Database
, but third party patches are provided
1 new security patch for Oracle Secure Backup
No new security patches for Oracle SQL Developer
, but third party patches are provided
No new security patches for Oracle TimesTen In-Memory Database
, but third party patches are provided
Oracle Database Server Risk Matrix
This Critical Patch Update contains 8 new security patches
plus additional third party patches noted below
for Oracle Database Products. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found
here.
Oracle has released client Database fixes for CVEs which we believe are not exploitable in the context of the Database. The Database server includes a full copy of all the client bits, so any patch that is client applicable, also has to be applied on the server side.
Additional CVEs addressed are:
The patch for CVE-2021-41495 also addresses CVE-2021-41496.
The patch for CVE-2022-1587 also addresses CVE-2022-1586.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
GraalVM Multilingual Engine: CVE-2022-34169, CVE-2022-21540, CVE-2022-21541, CVE-2022-21549 and CVE-2022-25647.
Oracle Application Express (Moment.js): CVE-2022-31129.
Oracle Database (Apache HttpClient): CVE-2020-13956.
Oracle Database (Apache Tomcat): CVE-2022-34305.
Oracle Database - Fleet Patching (Apache Tomcat): CVE-2021-25122 and CVE-2021-25329.
Oracle Database - RDBMS (OpenBLAS): CVE-2021-4048.
Oracle Database - RDBMS (Python): CVE-2021-3737.
Oracle Database - RDBMS Security (Apache MINA SSHD): CVE-2021-30129.
Oracle Database - Workload Manager (Eclipse Jetty): CVE-2022-2048 and CVE-2022-2047.
Oracle Database - ZFSSAADM (Google Gson): CVE-2022-25647.
Oracle Database Configuration Assistant: CVE-2019-2904.
Oracle Retail Data Model (Apache Log4j): CVE-2021-4104.
Oracle Airlines Data Model Risk Matrix
This Critical Patch Update contains
no new security patches but does include third party patches noted below
for Oracle Airlines Data Model. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Airlines Data Model. The English text form of this Risk Matrix can be found
here.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle Airlines Data Model
Installation (Apache Commons BeanUtils): CVE-2019-10086.
Installation (Apache Commons IO): CVE-2021-29425.
Installation (Apache Groovy): CVE-2020-17521.
Installation (Apache Log4j): CVE-2021-4104.
Installation (Nimbus JOSE+JWT): CVE-2019-17195.
Installation (Spring Framework): CVE-2021-22118 and CVE-2020-5421.
Installation (jackson-databind): CVE-2020-9546, CVE-2020-10650, CVE-2020-10672, CVE-2020-10673, CVE-2020-10968, CVE-2020-10969, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-14195, CVE-2020-25649, CVE-2020-36189, CVE-2020-9547 and CVE-2020-9548.
Oracle Big Data Graph Risk Matrix
This Critical Patch Update contains
no new security patches but does include third party patches noted below
for Oracle Big Data Graph. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Big Data Graph. The English text form of this Risk Matrix can be found
here.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Big Data Spatial and Graph
Big Data Graph (Apache Tomcat): CVE-2022-34305.
Oracle Communications Data Model Risk Matrix
This Critical Patch Update contains 1 new security patch
plus additional third party patches noted below
for Oracle Communications Data Model. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Additional CVEs addressed are:
The patch for CVE-2020-11987 also addresses CVE-2019-17566.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle Communications Data Model
Utilities (Apache Axis): CVE-2019-0227 and CVE-2018-8032.
Utilities (Apache Commons BeanUtils): CVE-2019-10086.
Additional CVEs addressed are:
The patch for CVE-2021-22946 also addresses CVE-2021-22947.
The patch for CVE-2021-44832 also addresses CVE-2021-44228.
Oracle GoldenGate Risk Matrix
This Critical Patch Update contains 2 new security patches
plus additional third party patches noted below
for Oracle GoldenGate. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2020-35169
Oracle GoldenGate
Oracle GoldenGate Microservices (Dell BSAFE Micro Edition Suite)
HTTPS
Network
changed
CVE-2018-18893
Oracle Goldengate
Stream Analytics (JinJava)
Network
changed
Additional CVEs addressed are:
The patch for CVE-2020-35169 also addresses CVE-2020-29508, CVE-2020-35163, CVE-2020-35164, CVE-2020-35166, CVE-2020-35167, and CVE-2020-35168.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle GoldenGate
Stream Analytics (Apache Tomcat): CVE-2022-23181.
Oracle NoSQL Database Risk Matrix
This Critical Patch Update contains
no new security patches but does include third party patches noted below
for Oracle NoSQL Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle NoSQL Database. The English text form of this Risk Matrix can be found
here.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle NoSQL Database
Administration (Google Gson): CVE-2022-25647.
Administration (jackson-databind): CVE-2020-36518.
Oracle Secure Backup Risk Matrix
This Critical Patch Update contains 1 new security patch
plus additional third party patches noted below
for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Additional CVEs addressed are:
The patch for CVE-2022-31813 also addresses CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, and CVE-2022-30556.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle Secure Backup
Oracle Secure Backup (PHP): CVE-2021-21708.
Oracle SQL Developer Risk Matrix
This Critical Patch Update contains
no new security patches but does include third party patches noted below
for Oracle SQL Developer. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle SQL Developer. The English text form of this Risk Matrix can be found
here.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle SQL Developer
Install (Apache Batik): CVE-2020-11987.
Install (Apache Kafka): CVE-2021-38153 and CVE-2021-26291.
Oracle TimesTen In-Memory Database Risk Matrix
This Critical Patch Update contains
no new security patches but does include third party patches noted below
for Oracle TimesTen In-Memory Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle TimesTen In-Memory Database. The English text form of this Risk Matrix can be found
here.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle TimesTen In-Memory Database
Kubernetes Operator (Golang Go): CVE-2022-28327 and CVE-2022-24675.
Oracle Communications Applications Risk Matrix
This Critical Patch Update contains 27 new security patches for Oracle Communications Applications. 21 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2018-1311
Oracle Communications Convergent Charging Controller
Common (Apache Xerces-C)
Network
changed
6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0
CVE-2018-1311
Oracle Communications Network Charging and Control
Gateway (Apache Xerces-C)
Network
changed
6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0
CVE-2022-31129
Oracle Communications Billing and Revenue Management
Billing Care (Moment.js)
Network
changed
12.0.0.4.0-12.0.0.6.0
CVE-2022-35737
Oracle Communications Convergent Charging Controller
Common (SQLite)
Network
changed
6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0
CVE-2022-31129
Oracle Communications Design Studio
PSR Designer (Moment.js)
Network
changed
7.4.2
CVE-2020-36518
Oracle Communications Instant Messaging Server
PresenceAPI (jackson-databind)
Network
changed
10.0.1.6.0
CVE-2022-35737
Oracle Communications Network Charging and Control
Common (SQLite)
Network
changed
6.0.1.0.0, 12.0.1.0.0-12.0.5.0.0
CVE-2022-25857
Oracle Communications Pricing Design Center
REST Service Manager (SnakeYAML)
Network
changed
12.0.0.5.0-12.0.0.7.0
CVE-2020-36518
Oracle Communications Pricing Design Center
REST Service Manager (jackson-databind)
Network
changed
12.0.0.4.0-12.0.0.7.0
CVE-2022-2048
Oracle Communications Unified Assurance
Message Bus (Eclipse Jetty)
Network
changed
Prior to 5.5.7.0.0, 6.0.0.0.0
CVE-2022-23181
Oracle Communications Instant Messaging Server
Installation (Apache Tomcat)
Local
changed
10.0.1.6.0
CVE-2021-44832
Oracle Communications Instant Messaging Server
Installation (Apache Log4j)
Network
changed
10.0.1.6.0
CVE-2021-44832
Oracle Communications MetaSolv Solution
Framework (Apache Log4j)
Network
changed
6.3.1
CVE-2021-44832
Oracle Communications Order and Service Management
Installer (Apache Log4j)
Network
changed
7.3, 7.4
CVE-2022-21601
Oracle Communications Billing and Revenue Management
Connection Manager
Network
changed
12.0.0.4.0-12.0.0.7.0
CVE-2022-23437
Oracle Communications MetaSolv Solution
Framework (Apache Xerces-J)
Network
Required
changed
6.3.1
CVE-2022-23437
Oracle Communications Order and Service Management
Installer (Apache Xerces-J)
Network
Required
changed
7.3, 7.4
CVE-2022-34305
Oracle Communications Unified Assurance
REST API (Apache Tomcat)
Network
Required
Changed
Prior to 5.5.7.0.0, 6.0.0.0.0
CVE-2021-21295
Oracle Communications Pricing Design Center
REST Service Manager (Netty)
Network
changed
12.0.0.4.0-12.0.0.6.0
CVE-2022-24823
Oracle Communications Design Studio
PSR Designer (Netty)
Local
changed
7.4.2
CVE-2022-24823
Oracle Communications Pricing Design Center
Rest Service Manager (Netty)
Local
changed
12.0.0.4.0-12.0.0.6.0
Additional CVEs addressed are:
The patch for CVE-2021-21295 also addresses CVE-2021-21409, and CVE-2021-43797.
The patch for CVE-2021-44832 also addresses CVE-2021-44228.
The patch for CVE-2022-23181 also addresses CVE-2020-9484.
The patch for CVE-2022-24823 also addresses CVE-2021-21290.
The patch for CVE-2022-25857 also addresses CVE-2022-38749, CVE-2022-38750, CVE-2022-38751, and CVE-2022-38752.
The patch for CVE-2022-31813 also addresses CVE-2022-26377, CVE-2022-28330, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, and CVE-2022-30556.
Oracle Communications Risk Matrix
This Critical Patch Update contains 74 new security patches
plus additional third party patches noted below
for Oracle Communications. 64 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2022-22978
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Signaling (Spring Security)
Network
changed
22.2.0
CVE-2022-1292
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Installer (OpenSSL)
HTTPS
Network
changed
22.2.1
CVE-2022-23218
Oracle Communications Cloud Native Core Unified Data Repository
Signaling (glibc)
Network
changed
22.1.1
CVE-2022-31813
Oracle Communications Diameter Signaling Router
Platform (Apache HTTP Server)
Network
changed
8.6.0.0
CVE-2021-21708
Oracle Communications Diameter Signaling Router
Platform (PHP)
Network
changed
8.6.0.0
CVE-2022-31813
Oracle Communications Element Manager
FEServer (Apache HTTP Server)
Network
changed
CVE-2022-22978
Oracle Communications Element Manager
Authentication (Spring Security)
Network
changed
CVE-2022-22978
Oracle Communications Interactive Session Recorder
Platform (Spring Security)
Network
changed
CVE-2021-31805
Oracle Communications Policy Management
Configuration Management Platform (Apache Struts)
Network
changed
12.6.0.0.0
CVE-2021-21783
Oracle Communications User Data Repository
Platform (gSOAP)
GSOAP
Network
changed
12.4.0
CVE-2022-31813
Oracle Communications User Data Repository
Platform (Apache HTTP Server)
Network
changed
12.4.0
CVE-2021-43527
Oracle Communications User Data Repository
Platform (NSS)
HTTPS
Network
changed
12.4.0
CVE-2021-23450
Oracle Communications WebRTC Session Controller
Platform (dojo)
Network
changed
7.2.0, 7.2.1
CVE-2022-31813
Oracle Enterprise Operations Monitor
User Login (Apache HTTP Server)
Network
changed
4.4, 5.0
CVE-2021-44790
Oracle SD-WAN Edge
Management (Apache HTTP Server)
Network
changed
7.0.7
CVE-2022-22978
Oracle SD-WAN Edge
Management (Spring Security)
Network
changed
9.1.1.2.0
CVE-2022-1586
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Signaling (PCRE2)
Network
changed
22.2.1
CVE-2022-1586
Oracle Communications Cloud Native Core Unified Data Repository
Signaling (PCRE2)
Network
changed
22.3.0
CVE-2019-3862
Oracle Communications User Data Repository
Platform (libssh2)
SSH-2
Network
changed
12.4.0
CVE-2020-13936
Oracle Communications User Data Repository
Platform (Apache Velocity Engine)
Network
changed
12.6.1
CVE-2020-10878
Oracle Communications User Data Repository
Platform (PERL)
Network
changed
12.4.0
CVE-2021-2351
Oracle Communications User Data Repository
Security (OJDBC)
Oracle Net
Network
Required
Changed
12.4.0
CVE-2022-1154
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
DBTier (vim)
Local
Required
changed
22.1.0, 22.2.0
CVE-2021-4034
Oracle SD-WAN Edge
Platform (Polkit)
Local
changed
7.0.7
CVE-2022-25647
Oracle Communications Cloud Native Core Binding Support Function
Signaling (Google Gson)
Network
changed
22.3.0
CVE-2022-25647
Oracle Communications Cloud Native Core Console
Installer (Google Gson)
Network
changed
22.2.0
CVE-2022-25857
Oracle Communications Cloud Native Core Console
Installer (SnakeYAML)
Network
changed
22.2.0
CVE-2022-2191
Oracle Communications Cloud Native Core Network Exposure Function
Platform (Eclipse Jetty)
Network
changed
22.2.1
CVE-2022-25857
Oracle Communications Cloud Native Core Network Exposure Function
Platform (SnakeYAML)
Network
changed
22.3.0
CVE-2022-24785
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Configuration (Moment.js)
Network
changed
22.1, 22.2
CVE-2022-27782
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Configuration (cURL)
Network
changed
22.1.0, 22.2.0
CVE-2022-24761
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
DBTier (waitress)
Network
changed
22.1.0, 22.2.0
CVE-2018-25032
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
DBTier (zlib)
Network
changed
22.1.0, 22.2.0
CVE-2022-2191
Oracle Communications Cloud Native Core Network Repository Function
Installation (Eclipse Jetty)
Network
changed
22.2.2
CVE-2022-25647
Oracle Communications Cloud Native Core Policy
Signaling (Google Gson)
Network
changed
22.3.0
CVE-2022-25857
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Signaling (SnakeYAML)
Network
changed
22.3.0
CVE-2018-25032
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Installer (zlib)
Network
changed
22.1.1
CVE-2022-25857
Oracle Communications Cloud Native Core Service Communication Proxy
Signaling (SnakeYAML)
Network
changed
22.2.3, 22.3.1, 22.4.0
CVE-2022-25857
Oracle Communications Cloud Native Core Unified Data Repository
Security (SnakeYAML)
Network
changed
22.2.1,22.3.0
CVE-2022-2191
Oracle Communications Cloud Native Core Unified Data Repository
Signaling (Eclipse Jetty)
Network
changed
22.3.0
CVE-2021-28165
Oracle Communications Converged Application Server - Service Controller
Platform (Eclipse Jetty)
Network
changed
CVE-2018-25032
Oracle Communications Diameter Signaling Router
Platform (zlib)
Network
changed
8.6.0.0
CVE-2022-29885
Oracle Communications Element Manager
BEServer (Apache Tomcat)
Network
changed
CVE-2022-2048
Oracle Communications Element Manager
GEN (Eclipse Jetty)
Network
changed
CVE-2020-36518
Oracle Communications Evolved Communications Application Server
Platform (jackson-databind)
Network
changed
CVE-2020-36518
Oracle Communications Policy Management
Configuration Management Platform (jackson-databind)
Network
changed
12.6.0.0.0
CVE-2020-36518
Oracle Communications Services Gatekeeper
Core (jackson-databind)
Network
changed
7.0.0.0.0
CVE-2021-40690
Oracle Communications Services Gatekeeper
OAuth (Apache Santuario XML Security for Java)
Network
changed
7.0.0.0.0
CVE-2018-25032
Oracle Communications Session Border Controller
System (zlib)
Network
changed
8.4, 9.0, 9.1
CVE-2022-25647
Oracle Communications WebRTC Session Controller
Platform (Google Gson)
Network
changed
7.2.0, 7.2.1
CVE-2022-23219
Oracle Communications Session Border Controller
Routing (glibc)
Network
changed
8.4, 9.0, 9.1
CVE-2021-44832
Oracle Communications Cloud Native Core Binding Support Function
Signaling (Apache Log4j)
Network
changed
22.3.0
CVE-2021-44832
Oracle Communications Cloud Native Core Policy
Signaling (Apache Log4j)
Network
changed
22.3.0
CVE-2022-32206
Oracle Communications Cloud Native Core Network Exposure Function
Oracle Linux (cURL)
Network
Required
changed
22.3.0
CVE-2022-29824
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Configuration (libxml2)
Network
Required
changed
22.2.1, 22.2.0
CVE-2022-32206
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Configuration (cURL)
Network
Required
changed
22.2.1
CVE-2022-32206
Oracle Communications Cloud Native Core Unified Data Repository
Signaling (cURL)
Network
Required
changed
22.3.0
CVE-2022-22971
Oracle Communications Element Manager
Security (Spring Framework)
Network
changed
CVE-2022-22971
Oracle Communications Interactive Session Recorder
Platform (Spring Framework)
HTTPS
Network
changed
CVE-2020-6950
Oracle Communications User Data Repository
Platform (Eclipse Mojarra)
Network
Required
changed
12.4.0
CVE-2022-22971
Oracle SD-WAN Edge
Management (Spring Framework)
Network
changed
9.1.1.2.0
CVE-2022-36033
Oracle Communications Cloud Native Core Console
Installer (jsoup)
Network
Required
Changed
22.2.0
CVE-2022-34305
Oracle Communications Diameter Signaling Router
Platform (Apache Tomcat)
Network
Required
Changed
8.6.0.0
CVE-2022-34305
Oracle Communications Session Report Manager
BEServer (Apache Tomcat)
Network
Required
Changed
CVE-2022-34305
Oracle Communications User Data Repository
Platform (Apache Tomcat)
Network
Required
Changed
12.4.0
CVE-2020-11022
Oracle Communications User Data Repository
Platform (HTTP)
Network
Required
Changed
12.4.0
CVE-2021-41184
Oracle SD-WAN Aware
Management (jQueryUI)
Network
Required
Changed
9.0.1.3.0
CVE-2021-3597
Oracle Communications Cloud Native Core Binding Support Function
Signaling (undertow)
Network
changed
22.3.0
CVE-2021-40528
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Configuration (GnuPG Libgcrypt)
Network
changed
22.1.0,22.2.0
CVE-2021-3597
Oracle Communications Cloud Native Core Policy
Signaling (undertow)
Network
changed
22.3.0
CVE-2021-3426
Oracle Communications Cloud Native Core Network Function Cloud Native Environment
Configuration (Python)
Adjacent
Network
changed
1.9.0
CVE-2022-21123
Oracle Communications Diameter Signaling Router
Platform (Microcode Controller)
Local
changed
8.6.0.0
CVE-2020-29582
Oracle Communications User Data Repository
Platform (JetBrains Kotlin)
Network
changed
12.6.0
CVE-2021-21707
Oracle Communications User Data Repository
Platform (PHP)
Network
changed
12.4.0
Additional CVEs addressed are:
The patch for CVE-2019-3862 also addresses CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858, CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, and CVE-2019-3863.
The patch for CVE-2020-10878 also addresses CVE-2020-10543, and CVE-2020-12723.
The patch for CVE-2020-11022 also addresses CVE-2019-1543, and CVE-2020-11023.
The patch for CVE-2021-28165 also addresses CVE-2021-28163, and CVE-2021-28164.
The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
The patch for CVE-2021-44790 also addresses CVE-2021-26690, CVE-2021-26691, CVE-2021-34798, and CVE-2021-39275.
The patch for CVE-2022-1292 also addresses CVE-2022-2068, and CVE-2022-2097.
The patch for CVE-2022-2048 also addresses CVE-2022-2047, and CVE-2022-2191.
The patch for CVE-2022-21123 also addresses CVE-2022-21125, CVE-2022-21127, and CVE-2022-21166.
The patch for CVE-2022-2191 also addresses CVE-2022-2048.
The patch for CVE-2022-22971 also addresses CVE-2022-22970.
The patch for CVE-2022-22978 also addresses CVE-2022-22976.
The patch for CVE-2022-23218 also addresses CVE-2022-23219.
The patch for CVE-2022-23219 also addresses CVE-2021-38604, CVE-2021-43396, and CVE-2022-23218.
The patch for CVE-2022-27782 also addresses CVE-2022-27778, CVE-2022-27779, CVE-2022-27780, CVE-2022-27781, and CVE-2022-30115.
The patch for CVE-2022-31813 also addresses CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, and CVE-2022-30556.
The patch for CVE-2022-32206 also addresses CVE-2022-32208.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Oracle Communications Cloud Native Core Security Edge Protection Proxy
Signaling (Kubernetes Client): CVE-2021-4178.
Oracle Construction and Engineering Risk Matrix
This Critical Patch Update contains 5 new security patches
plus additional third party patches noted below
for Oracle Construction and Engineering. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Additional patches are included in this Critical Patch Update for the following non-exploitable CVEs in this Oracle product family:
Primavera Unifier
Document Management (Apache ZooKeeper): CVE-2020-7712.
Platform, User Interface (Apache Velocity Engine): CVE-2020-13936.
Oracle E-Business Suite Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle E-Business Suite. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the October 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (October 2022),
My Oracle Support Note 2484000.1
.
CVE-2022-23305
Application Management Pack for Oracle E-Business Suite
EBS EM Plugin (Apache Log4j)
Network
changed
13.4.1.0.0
See Note 1
CVE-2022-21587
Oracle Web Applications Desktop Integrator
Upload
Network
changed
12.2.3-12.2.11
CVE-2022-39428
Oracle Web Applications Desktop Integrator
Upload
Network
changed
12.2.3-12.2.11
CVE-2019-10086
Oracle Human Resources
Common Modules (Apache Commons BeanUtils)
Network
changed
12.2.3-12.2.11
CVE-2022-21636
Oracle Applications Framework
Session Management
Network
changed
12.2.6-12.2.11
Oracle Enterprise Manager Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle Enterprise Manager. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found
here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the October 2022 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2022 Patch Availability Document for Oracle Products,
My Oracle Support Note 2888514.1
.
CVE-2018-1285
Enterprise Manager Base Platform
Application Service Level Management (Apache log4net)
Network
changed
13.4.0.0
CVE-2021-23450
Enterprise Manager Ops Center
Networking (dojo)
Network
changed
12.4.0.0
CVE-2022-21623
Enterprise Manager Base Platform
Application Config Console
Network
changed
13.4.0.0, 13.5.0.0
CVE-2021-4104
Enterprise Manager Base Platform
Application Service Level Management (Apache Log4j)
Network
changed
13.4.0.0
CVE-2020-36518
Enterprise Manager for Virtualization
Plug-In Lifecycle (jackson-databind)
Network
changed
13.4.0.0, 13.5.0.0
Oracle Financial Services Applications Risk Matrix
This Critical Patch Update contains 24 new security patches for Oracle Financial Services Applications. 16 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2022-23457
Oracle Financial Services Analytical Applications Infrastructure
Others (Enterprise Security API)
Network
changed
8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1
CVE-2020-36518
Oracle Banking Enterprise Default Management
Collections (jackson-databind)
Network
changed
2.12.0
CVE-2020-36518
Oracle Banking Loans Servicing
Web UI (jackson-databind)
Network
changed
2.8.0, 2.12.0
CVE-2020-36518
Oracle Banking Party Management
Web UI (jackson-databind)
Network
changed
2.7.0
CVE-2022-25647
Oracle Banking Platform
Security (Google Gson)
Network
changed
2.9.0
CVE-2020-36518
Oracle Banking Platform
Security (jackson-databind)
Network
changed
2.7.1, 2.9.0, 2.12.0
CVE-2022-31129
Oracle Financial Services Analytical Applications Infrastructure
Others (Moment.js)
Network
changed
8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1
CVE-2022-31129
Oracle Financial Services Behavior Detection Platform
User Interface (Moment.js)
Network
changed
8.0.7.2, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2
CVE-2022-31129
Oracle Financial Services Enterprise Case Management
Installer (Moment.js)
Network
changed
8.0.7.3, 8.0.8.2, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2
CVE-2021-40690
Oracle Financial Services Model Management and Governance
Installer & Configuration (Apache Santuario XML Security For Java)
Network
changed
8.1.1.0
CVE-2022-25647
Oracle Financial Services Model Management and Governance
Installer & Configuration (Google Gson)
Network
changed
8.0.8.0, 8.1.0.0, 8.1.1.0
CVE-2022-31129
Oracle Financial Services Model Management and Governance
Installer (Moment.js)
Network
changed
8.0.8.0, 8.1.0.0
CVE-2022-31129
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition
User Interface (Moment.js)
Network
changed
8.0.7.0, 8.0.8.0
CVE-2022-23181
Oracle Financial Services Model Management and Governance
Installer & Configuration (Apache Tomcat)
Local
changed
8.0.8.0, 8.1.0.0, 8.1.1.0
CVE-2021-44832
Oracle Financial Services Model Management and Governance
Installer & Configuration (Apache Log4j)
Network
changed
8.0.8.0, 8.1.0.0, 8.1.1.0
CVE-2022-22971
Oracle Financial Services Analytical Applications Infrastructure
Others (Spring Framework)
Network
changed
8.0.7.0-8.1.0.0, 8.1.1.0, 8.1.2.0, 8.1.2.1
CVE-2022-22971
Oracle Financial Services Behavior Detection Platform
User Interface (Spring Framework)
Network
changed
8.0.7.2, 8.0.8.1, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2
CVE-2022-22971
Oracle Financial Services Enterprise Case Management
Installer (Spring Framework)
Network
changed
8.0.7.3, 8.0.8.2, 8.1.1.0, 8.1.1.1, 8.1.2.0, 8.1.2.1, 8.1.2.2
CVE-2022-22971
Oracle Financial Services Model Management and Governance
Installer & Configuration (Spring Framework)
Network
changed
8.0.8.0, 8.1.0.0, 8.1.1.0
CVE-2022-22971
Oracle Financial Services Trade-Based Anti Money Laundering Enterprise Edition
User Interface (Spring Framework)
Network
changed
8.0.7.0, 8.0.8.0
CVE-2022-29577
Oracle Banking Enterprise Default Management
Collections (AntiSamy)
Network
Required
Changed
2.12.0
CVE-2022-29577
Oracle Banking Party Management
Web UI (AntiSamy)
Network
Required
Changed
2.7.0
CVE-2022-29577
Oracle Banking Platform
Security (AntiSamy)
Network
Required
Changed
2.9.0
CVE-2022-24823
Oracle Financial Services Model Management and Governance
Installer & Configuration (Netty)
Local
changed
8.0.8.0, 8.1.0.0, 8.1.1.0
Additional CVEs addressed are:
The patch for CVE-2022-22971 also addresses CVE-2022-22970.
The patch for CVE-2022-23457 also addresses CVE-2022-24891.
Oracle Fusion Middleware Risk Matrix
This Critical Patch Update contains 56 new security patches for Oracle Fusion Middleware. 43 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Oracle Fusion Middleware products include Oracle Database components that are affected by the vulnerabilities listed in the Oracle Database section. The exposure of Oracle Fusion Middleware products is dependent on the Oracle Database version being used. Oracle Database security updates are not listed in the Oracle Fusion Middleware risk matrix. However, since vulnerabilities affecting Oracle Database versions may affect Oracle Fusion Middleware products, Oracle recommends that customers apply the Critical Patch Update October 2022 to the Oracle Database components of Oracle Fusion Middleware products. For information on what patches need to be applied to your environments, refer to Critical Patch Update October 2022 Patch Availability Document for Oracle Products,
My Oracle Support Note 2899414.2
.
CVE-2022-33980
Oracle Business Intelligence Enterprise Edition
BI Application Archive (Apache Commons Configuration)
Network
changed
5.9.0.0, 6.4.0.0
CVE-2019-17195
Oracle Data Integrator
WLS Configuration Template (Nimbus JOSE+JWT)
Network
changed
12.2.1.4.0
CVE-2022-23943
Oracle HTTP Server
SSL Module (Apache HTTP Server)
HTTPS
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-23305
Oracle Middleware Common Libraries and Tools
Third Party Patch (Apache Log4j)
Network
changed
12.2.1.3.0
CVE-2022-25315
Oracle Outside In Technology
Outside In Filters (LibExpat)
HTTPS
Network
changed
8.5.6
CVE-2022-23305
Oracle WebCenter Content
Web Content Management (Apache Log4j)
Network
changed
12.2.1.3.0
CVE-2021-23450
Oracle WebCenter Portal
Security Framework (dojo)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2021-23450
Oracle WebCenter Sites
Centralized Thirdparty Jars (dojo)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-32532
Oracle WebCenter Sites
WebCenter Sites (Apache Shiro)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-21613
Oracle Enterprise Data Quality
Dashboard
Network
Required
Changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-13936
Oracle Identity Management Suite
Installer (Apache Velocity Engine)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-28052
Oracle Business Process Management Suite
Installer (Bouncy Castle Java Library)
HTTPS
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-21612
Oracle Enterprise Data Quality
Dashboard
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-28052
Oracle WebLogic Server
Centralized Thirdparty Jars (Bouncy Castle Java Library)
Network
changed
12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-21590
Oracle BI Publisher
Core Formatting API
Network
changed
5.9.0.0, 6.4.0.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2021-40690
BI Publisher
Web Server (Apache CXF)
Network
changed
5.9.0.0, 6.4.0.0.0
CVE-2022-39412
Oracle Access Manager
Admin Console
Network
changed
12.2.1.4.0
CVE-2022-25647
Oracle BI Publisher
Security (Google Gson)
Network
changed
5.9.0.0, 6.4.0.0.0, 12.2.1.3.0, 12.2.1.4.0
CVE-2021-43859
Oracle Business Activity Monitoring(Oracle BAM)
General (XStream)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-24729
Oracle Business Intelligence Enterprise Edition
Analytics Server (CKEditor)
Network
changed
5.9.0.0, 6.4.0.0
CVE-2020-36518
Oracle Business Intelligence Enterprise Edition
Analytics Server (jackson-databind)
Network
changed
6.4.0.0
CVE-2021-36090
Oracle Business Intelligence Enterprise Edition
Analytics Web ADF Integration (Apache Commons Compress)
Network
changed
5.9.0.0
CVE-2022-25647
Oracle Data Integrator
Runtime Java agent for ODI (Google Gson)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-21614
Oracle Enterprise Data Quality
Dashboard
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-25647
Oracle Middleware Common Libraries and Tools
Thirdparty Patch (Google Gson)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2018-25032
Oracle Outside In Technology
Outside In Filters (Python)
Network
changed
8.5.6
CVE-2022-21622
Oracle SOA Suite
Adapters
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2021-40690
Oracle WebCenter Portal
Security Framework (Apache Santuario XML Security For Java)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-24729
Oracle WebCenter Portal
Security Framework (CKEditor)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2021-43859
Oracle WebCenter Portal
Security Framework (XStream)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-36518
Oracle WebCenter Portal
Security Framework (jackson-databind)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-24729
Oracle WebCenter Sites
WebCenter Sites (CKEditor)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2021-43859
Oracle WebCenter Sites
WebCenter Sites (XStream)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-21615
Oracle Enterprise Data Quality
Dashboard
Network
Required
Changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-21593
Oracle HTTP Server
OHS Config MBeans
Network
Required
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-22971
Oracle Data Integrator
Runtime Java agent for ODI (Spring Framework)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-24977
Oracle HTTP Server
Web Listener (libxml2)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-22971
Oracle Middleware Common Libraries and Tools
Thirdparty Patch (Spring Framework)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-23437
Oracle WebCenter Portal
Security Framework (Apache Xerces-J)
Network
Required
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-23437
Oracle WebLogic Server
Centralized Thirdparty Jars (Apache Xerces-J)
Network
Required
changed
12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2022-22971
Oracle WebLogic Server
Centralized Thirdparty Jars (Spring Framework)
Network
changed
12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-41184
Oracle MapViewer
Oracle Maps (jQueryUI)
Network
Required
Changed
12.2.1.3.0, 12.2.1.4.0
CVE-2021-3537
Oracle HTTP Server
SSL Module (libxml2)
HTTPS
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-21609
Oracle Business Intelligence Enterprise Edition
Analytics Server
Network
Required
changed
5.9.0.0
CVE-2022-24823
Oracle Coherence
Configuration and Parsing (Netty)
Local
changed
12.2.1.4.0, 14.1.1.0.0
CVE-2020-17521
Oracle Data Integrator
Runtime Java agent for ODI (Apache Groovy)
Local
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-30126
Oracle WebCenter Portal
Security Framework (Apache Tika)
Local
Required
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-24823
Oracle WebCenter Portal
Security Framework (Netty)
Local
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-17521
Oracle WebLogic Server
Centralized Thirdparty Jars (Apache Groovy)
Local
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-39405
Oracle Access Manager
Authentication Engine
Network
changed
12.2.1.3.0
CVE-2021-34429
Oracle Data Integrator
Runtime Java agent for ODI (Eclipse Jetty)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2020-14155
Oracle HTTP Server
SSL Module (PCRE)
HTTPS
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2022-22968
Oracle WebLogic Server
Samples (Spring Framework)
Network
changed
12.2.1.4.0, 14.1.1.0.0
CVE-2022-21616
Oracle WebLogic Server
Web Container
Local
changed
12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
CVE-2021-29425
Oracle Data Integrator
Runtime Java agent for ODI (Apache Commons IO)
Network
changed
12.2.1.3.0, 12.2.1.4.0
CVE-2021-29425
Oracle WebLogic Server
Centralized Thirdparty Jars (Commons IO)
Network
changed
12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
Additional CVEs addressed are:
The patch for CVE-2020-14155 also addresses CVE-2019-20838.
The patch for CVE-2020-24977 also addresses CVE-2019-19956.
The patch for CVE-2021-3537 also addresses CVE-2019-20388, CVE-2020-24977, CVE-2020-7595, CVE-2021-3517, and CVE-2021-3518.
The patch for CVE-2021-36090 also addresses CVE-2021-35515, CVE-2021-35516, and CVE-2021-35517.
The patch for CVE-2022-22971 also addresses CVE-2022-22970.
The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.
The patch for CVE-2022-23943 also addresses CVE-2019-10092, CVE-2020-1934, and CVE-2022-22720.
The patch for CVE-2022-24729 also addresses CVE-2022-24728.
The patch for CVE-2022-24823 also addresses CVE-2021-21290.
The patch for CVE-2022-25315 also addresses CVE-2022-23990, CVE-2022-25235, CVE-2022-25236, CVE-2022-25313, and CVE-2022-25314.
The patch for CVE-2022-30126 also addresses CVE-2022-25169.
Oracle HealthCare Applications Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle HealthCare Applications. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Oracle Hospitality Applications Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle Hospitality Applications. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2022-22971
Oracle Hospitality Cruise Shipboard Property Management System
Next-Gen SPMS (Spring Boot)
Network
changed
20.2.0
CVE-2022-34305
Oracle Hospitality Cruise Shipboard Property Management System
Next-Gen SPMS (Apache Tomcat)
Network
Required
Changed
20.2.2
CVE-2022-33980
Oracle Hyperion Infrastructure Technology
Installation and Configuration (Apache Commons Configuration)
Network
changed
11.2.9
Oracle Insurance Applications Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle Insurance Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2022-22971
Oracle Documaker Enterprise Edition
Interactive Docupresentment Server (Spring Framework)
Network
changed
12.6-12.7
CVE-2019-12415
Oracle Insurance Insbridge Rating and Underwriting
Framework Administrator IBFA (Apache POI)
Local
changed
5.2.0, 5.4.0-5.6.2
CVE-2021-29425
Oracle Insurance Insbridge Rating and Underwriting
Framework Administrator IBFA (Apache Commons IO)
Network
changed
5.2.0, 5.4.0-5.6.2
Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0
See Note 1
CVE-2022-21626
Oracle Java SE, Oracle GraalVM Enterprise Edition
Security
HTTPS
Network
changed
Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0
See Note 2
CVE-2022-21618
Oracle Java SE, Oracle GraalVM Enterprise Edition
Kerberos
Network
changed
Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3, 22.2.0
See Note 2
CVE-2022-39399
Oracle Java SE, Oracle GraalVM Enterprise Edition
Networking
Network
changed
Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0
See Note 1
CVE-2022-21624
Oracle Java SE, Oracle GraalVM Enterprise Edition
Multiple
Network
changed
Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0
See Note 2
CVE-2022-21619
Oracle Java SE, Oracle GraalVM Enterprise Edition
Security
Multiple
Network
changed
Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3, 22.2.0
See Note 2
Notes:
This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.
Additional CVEs addressed are:
The patch for CVE-2022-32215 also addresses CVE-2022-32212, CVE-2022-32213, CVE-2022-32214, CVE-2022-32222, CVE-2022-32223, CVE-2022-35255, and CVE-2022-35256.
Oracle JD Edwards Risk Matrix
This Critical Patch Update contains 10 new security patches for Oracle JD Edwards. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2020-36518
JD Edwards EnterpriseOne Orchestrator
E1 IOT Orchestrator Security (jackson-databind)
Network
changed
9.2.6.4 and prior
CVE-2020-36518
JD Edwards EnterpriseOne Tools
Monitoring and Diagnostics SEC (jackson-databind)
Network
changed
9.2.6.4 and prior
CVE-2020-36518
JD Edwards EnterpriseOne Tools
Web Runtime SEC (jackson-databind)
Network
changed
9.2.6.4 and prior
CVE-2022-23437
JD Edwards EnterpriseOne Orchestrator
E1 IOT Orchestrator Security (Apache Xerces-J)
Network
Required
changed
9.2.6.2 and prior
CVE-2022-23437
JD Edwards EnterpriseOne Tools
Interoperability SEC (Apache Xerces-J)
Network
Required
changed
9.2.6.3 and prior
CVE-2022-21631
JD Edwards EnterpriseOne Tools
Design Tools SEC
Network
Required
Changed
9.2.6.4 and prior
CVE-2022-21630
JD Edwards EnterpriseOne Tools
Web Runtime SEC
Network
Required
Changed
9.2.6.4 and prior
CVE-2022-21629
JD Edwards EnterpriseOne Tools
Web Runtime SEC
Network
Required
Changed
9.2.6.4 and prior
Oracle Retail Applications Risk Matrix
This Critical Patch Update contains 27 new security patches for Oracle Retail Applications. 21 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2021-28490
Oracle Retail Customer Management and Segmentation Foundation
Segment (OWASP CSRFGuard)
Network
Required
changed
18.0, 19.0
CVE-2021-43859
Oracle Retail Customer Insights
Other (XStream)
Network
changed
15.0.2, 16.0.2
CVE-2022-25647
Oracle Retail Customer Management and Segmentation Foundation
Security (Google Gson)
Network
changed
17.0, 18.0, 19.0
CVE-2022-25647
Oracle Retail EFTLink
Installation (Google Gson)
Network
changed
20.0.1, 21.0.0
CVE-2022-2048
Oracle Retail EFTLink
Other (Eclipse Jetty)
Network
changed
20.0.1, 21.0.0
CVE-2020-36518
Oracle Retail Merchandising System
Foundation (jackson-databind)
Network
changed
15.0.3.1
CVE-2020-36518
Oracle Retail Service Backbone
RSB Installation (jackson-databind)
Network
changed
14.1.3.2, 15.0.3.1, 16.0.3
CVE-2022-22971
Oracle Retail Assortment Planning
Application Core (Spring Framework)
Network
changed
16.0.3
CVE-2022-23437
Oracle Retail Back Office
Security (Apache Xerces-J)
Network
Required
changed
CVE-2022-23437
Oracle Retail Central Office
Security (Apache Xerces-J)
Network
Required
changed
CVE-2020-6950
Oracle Retail Customer Insights
Other (Eclipse Mojarra)
Network
Required
changed
15.0.2, 16.0.2
CVE-2022-22971
Oracle Retail Customer Insights
Other (Spring Framework)
Network
changed
15.0.2, 16.0.2
CVE-2022-23437
Oracle Retail Fiscal Management
OTHERS (Apache Xerces-J)
Network
Required
changed
CVE-2022-22971
Oracle Retail Merchandising System
Foundation (Spring Framework)
Network
changed
19.0.1
CVE-2022-23437
Oracle Retail Point Of Service
Security (Apache Xerces-J)
Network
Required
changed
CVE-2022-22971
Oracle Retail Predictive Application Server
RPAS Server (Spring Framework)
Network
changed
14.1.3.47, 15.0.3.116, 16.0.3.260
CVE-2022-23437
Oracle Retail Returns Management
Security (Apache Xerces-J)
Network
Required
changed
CVE-2022-29577
Oracle Retail Back Office
Security (AntiSamy)
Network
Required
Changed
CVE-2021-41184
Oracle Retail Back Office
Security (jQueryUI)
Network
Required
Changed
CVE-2022-29577
Oracle Retail Central Office
Security (AntiSamy)
Network
Required
Changed
CVE-2021-41184
Oracle Retail Central Office
Security (jQueryUI)
Network
Required
Changed
CVE-2022-29577
Oracle Retail Returns Management
Security (AntiSamy)
Network
Required
Changed
CVE-2021-41184
Oracle Retail Returns Management
Security (jQueryUI)
Network
Required
Changed
CVE-2021-36374
Oracle Retail Merchandising System
Installation (Apache Ant)
Local
Required
changed
14.1.3.2
CVE-2021-36374
Oracle Retail Sales Audit
others (Apache Ant)
Local
Required
changed
19.0.1
CVE-2021-29425
Oracle Retail Customer Insights
Other (Apache Commons IO)
Network
changed
15.02, 16.0.2
Additional CVEs addressed are:
The patch for CVE-2021-36374 also addresses CVE-2021-36373.
The patch for CVE-2021-41184 also addresses CVE-2021-41182, and CVE-2021-41183.
The patch for CVE-2022-2048 also addresses CVE-2022-2047, and CVE-2022-2191.
The patch for CVE-2022-22971 also addresses CVE-2022-22970.
The patch for CVE-2022-23305 also addresses CVE-2021-4104, CVE-2022-23302, and CVE-2022-23307.
Oracle Siebel CRM Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Siebel CRM. 12 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2022-22971
Siebel Engineering - Installer & Deployment
Siebel Approval Manager (Spring Framework)
Network
changed
22.8 and prior
CVE-2022-34305
Siebel UI Framework
EAI (Apache Tomcat)
Network
Required
Changed
22.8 and prior
CVE-2021-41182
Siebel UI Framework
Open UI (jQueryUI)
Network
Required
Changed
22.8 and prior
CVE-2021-29425
Siebel Apps - Marketing
Marketing (Apache Commons IO)
Network
changed
22.8 and prior
Additional CVEs addressed are:
The patch for CVE-2020-16856 also addresses CVE-2020-16874.
The patch for CVE-2021-41182 also addresses CVE-2021-41183, and CVE-2021-41184.
The patch for CVE-2022-22971 also addresses CVE-2022-22970.
The patch for CVE-2022-24729 also addresses CVE-2022-24728.
Oracle Supply Chain Risk Matrix
This Critical Patch Update contains 13 new security patches for Oracle Supply Chain. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
CVE-2022-2048
Oracle Autovue for Agile Product Lifecycle Management
Autovue Client (Eclipse Jetty)
Network
changed
21.0.2
CVE-2020-36518
Oracle Autovue for Agile Product Lifecycle Management
Autovue Client (jackson-databind)
Network
changed
21.0.2
CVE-2022-23437
Oracle Transportation Management
XML Parser (Apache Xerces-J)
Network
Required
changed
6.4.3, 6.5.1
CVE-2022-39420
Oracle Transportation Management
Data, Functional Security
Network
changed
6.4.3, 6.5.1
CVE-2022-21591
Oracle Transportation Management
UI Infrastructure
Network
changed
6.4.3, 6.5.1
CVE-2022-39411
Oracle Transportation Management
Business Process Automation
Network
changed
6.4.3, 6.5.1
CVE-2022-39409
Oracle Transportation Management
Business Process Automation
Network
changed
6.4.3, 6.5.1
Notes:
This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
Additional CVEs addressed are:
The patch for CVE-2022-2048 also addresses CVE-2022-2047, and CVE-2022-2191.
The patch for CVE-2022-23305 also addresses CVE-2022-23302, and CVE-2022-23307.
The patch for CVE-2022-24729 also addresses CVE-2022-24728.
Oracle Systems Risk Matrix
This Critical Patch Update contains 8 new security patches for Oracle Systems. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Oracle Utilities Applications Risk Matrix
This Critical Patch Update contains 6 new security patches for Oracle Utilities Applications. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.
Additional CVEs addressed are:
The patch for CVE-2022-22971 also addresses CVE-2022-22970.
The patch for CVE-2022-22978 also addresses CVE-2022-22976.
Oracle Virtualization Risk Matrix
This Critical Patch Update contains 10 new security patches for Oracle Virtualization. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found
here.