Contáctanos al
1510
El CSIRT de Gobierno comparte información sobre vulnerabilidades que afectan a varios productos de Oracle, que fueron parchadas y comunicadas por la empresa como parte de su actualización de seguridad de enero 2023 (Oracle Critical Patch Update Advisory – January 2023).
Vulnerabilidades
CVE-2018-1273
CVE-2018-25032
CVE-2018-7489
CVE-2019-12415
CVE-2019-17571
CVE-2019-7317
CVE-2020-10683
CVE-2020-10693
CVE-2020-10735
CVE-2020-11979
CVE-2020-11987
CVE-2020-13956
CVE-2020-16156
CVE-2020-27844
CVE-2020-36242
CVE-2020-36518
CVE-2021-23358
CVE-2021-2351
CVE-2021-29425
CVE-2021-31805
CVE-2021-31812
CVE-2021-36090
CVE-2021-36483
CVE-2021-36770
CVE-2021-3737
CVE-2021-37533
CVE-2021-3918
CVE-2021-40528
CVE-2021-41184
CVE-2021-41411
CVE-2021-42717
CVE-2021-43797
CVE-2021-44832
CVE-2021-45105
CVE-2022-0084
CVE-2022-0492
CVE-2022-0934
CVE-2022-1122
CVE-2022-1304
CVE-2022-1319
CVE-2022-1941
CVE-2022-2048
CVE-2022-2053
CVE-2022-21824
CVE-2022-2274
CVE-2022-22965
CVE-2022-22970
CVE-2022-22971
CVE-2022-22978
CVE-2022-23219
CVE-2022-23221
CVE-2022-23305
CVE-2022-23437
CVE-2022-23457
CVE-2022-24329
CVE-2022-24407
CVE-2022-24823
CVE-2022-24839
CVE-2022-24903
CVE-2022-2509
CVE-2022-25236
CVE-2022-2526
CVE-2022-25315
CVE-2022-25647
CVE-2022-25857
CVE-2022-26336
CVE-2022-27404
CVE-2022-27782
CVE-2022-29824
CVE-2022-30126
CVE-2022-3028
CVE-2022-30293
CVE-2022-31129
CVE-2022-31629
CVE-2022-31692
CVE-2022-3171
CVE-2022-31813
CVE-2022-32212
CVE-2022-32221
CVE-2022-33980
CVE-2022-34169
CVE-2022-34305
CVE-2022-34917
CVE-2022-3510
CVE-2022-35737
CVE-2022-36033
CVE-2022-36055
CVE-2022-37434
CVE-2022-37454
CVE-2022-38752
CVE-2022-39271
CVE-2022-39429
CVE-2022-40146
CVE-2022-40149
CVE-2022-40150
CVE-2022-40153
CVE-2022-40304
CVE-2022-40664
CVE-2022-4147
CVE-2022-41720
CVE-2022-41881
CVE-2022-42003
CVE-2022-42252
CVE-2022-42889
CVE-2022-42915
CVE-2022-42920
CVE-2022-43403
CVE-2022-43548
CVE-2022-43680
CVE-2022-45047
CVE-2023-21824
CVE-2023-21825
CVE-2023-21826
CVE-2023-21827
CVE-2023-21828
CVE-2023-21829
CVE-2023-21830
CVE-2023-21831
CVE-2023-21832
CVE-2023-21834
CVE-2023-21835
CVE-2023-21836
CVE-2023-21837
CVE-2023-21838
CVE-2023-21839
CVE-2023-21840
CVE-2023-21841
CVE-2023-21842
CVE-2023-21843
CVE-2023-21844
CVE-2023-21845
CVE-2023-21846
CVE-2023-21847
CVE-2023-21848
CVE-2023-21849
CVE-2023-21850
CVE-2023-21851
CVE-2023-21852
CVE-2023-21853
CVE-2023-21854
CVE-2023-21855
CVE-2023-21856
CVE-2023-21857
CVE-2023-21858
CVE-2023-21859
CVE-2023-21860
CVE-2023-21861
CVE-2023-21862
CVE-2023-21863
CVE-2023-21864
CVE-2023-21865
CVE-2023-21866
CVE-2023-21867
CVE-2023-21868
CVE-2023-21869
CVE-2023-21870
CVE-2023-21871
CVE-2023-21872
CVE-2023-21873
CVE-2023-21874
CVE-2023-21875
CVE-2023-21876
CVE-2023-21877
CVE-2023-21878
CVE-2023-21879
CVE-2023-21880
CVE-2023-21881
CVE-2023-21882
CVE-2023-21883
CVE-2023-21884
CVE-2023-21885
CVE-2023-21886
CVE-2023-21887
CVE-2023-21888
CVE-2023-21889
CVE-2023-21890
CVE-2023-21891
CVE-2023-21892
CVE-2023-21893
CVE-2023-21894
CVE-2023-21898
CVE-2023-21899
CVE-2023-21900
CVE-2021-21708
CVE-2022-2047
CVE-2022-21597
CVE-2022-2191
CVE-2022-22950
CVE-2022-38749
CVE-2022-38750
CVE-2022-38751
CVE-2022-42004
Impacto
Vulnerabilidades de riesgo crítico
CVE-2022-2274: Vulnerabilidad fácil de explotar, existente en el componente Essbase Web Platform (OpenSSL) de Oracle Essbase 21.4, en el producto Siebel CRM de Oracle Siebel CRM 22.10. Permite a un atacante no autenticado con acceso de red via HTTPS comprometer Oracle Essbase o Oracle Siebel CRM 22.1.0, según corresponda.
CVE-2022-22965: Vulnerabilidad en el producto Oracle Commerce Guided Search de Oracle Commerce 11.3.2. Vulnerabilidad fácil de explotar que permite a un atacante no autenticado con acceso de red via HTTP comprometer Oracle Commerce Guided Search.
CVE-2022-42889: Vulnerabilidad en varios productos de Oracle Communications Applications, Oracle Fusion Middleware, Oracle Hyperion, Oracle JD Edwards, Oracle Utilities Applications y Oracle Database Server. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer aquellos productos.
CVE-2022-33980: Vulnerabilidad fácil de explotar que permite a un atacante no autenticado con acceso de red via HTTP comprometer varios productos de Oracle Financial Services Applications, al producto Oracle Communications Elastic Charging Engine de Oracle Communications Applications 12.0.0.5.0-12.0.0.7.0, los productos Oracle Banking Party Management, Oracle Financial Services Crime and Compliance Management Studio y Oracle Banking Enterprise Default Management de Oracle Financial Services Applications 2.7.0. y al producto Oracle Communications Elastic Charging Engine de Oracle Communications Application 12.0.0.5.0-12.0.0.7.0. y 8.0.8.3.1. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer los respectivos productos mencionados.
CVE-2019-17571: Vulnerabilidad en el producto Oracle Communications Unified Assurance de Oracle Communications Applications 5.5.0-5.5.9 y 6.0.0-6.0.1. Fácil de explotar, permite a un atacante no autenticado con acceso de red a través de HTTPS comprometer Oracle Communications Unified Assurance.
CVE-2022-22978: Vulnerabilidad en el producto Oracle Communications Unified Assurance de Oracle Communications Applications 5.5.0-5.5.9 y 6.0.0-6.0.1. Fácil de explotar, permite a un atacante no autenticado con acceso de red a través de HTTPS comprometer Oracle Communications Unified Assurance.
CVE-2022-37454: Vulnerabilidad en el producto Oracle Communications Unified Assurance de Oracle Communications Applications 5.5.0-5.5.9. Fácil de explotar, permite a un atacante no autenticado con acceso de red a través de HTTPS comprometer Oracle Communications Unified Assurance.
CVE-2022-31692: Vulnerabilidad en productos de Oracle Communications 22.3.0 y 22.3.1 y en el producto MySQL Enterprise Monitor de Oracle MySQL 8.0.32 y anteriores. Fácil de explotar, permite a un atacante no autenticado con acceso de red a través de HTTPS comprometer productos de Oracle Communications y MySQL Enterprise Monitor.
CVE-2021-41411: Vulnerabilidad en el producto Oracle Communications Unified Inventory Management de Oracle Communications Applications 7.4.0, 7.4.1, 7.4.2 y 7.5.0. Fácil de explotar, permite a un atacante no autenticado con acceso de red a través de HTTPS comprometer productos de Oracle Communications Unified Inventory Management.
CVE-2022-43403: Vulnerabilidad en el producto Oracle Communications Cloud Native Core Unified Data Repository de Oracle Communications 22.3.3. Fácil de explotar, permite a un atacante con bajos privilegios y acceso de red a través de HTTPS comprometer a Oracle Communications Cloud Native Core Unified Data Repository.
CVE-2022-2526: Vulnerabilidad en el producto Oracle Communications Cloud Native Core Automated Test Suite de Oracle Communications 22.2.2, 22.3.1 y 22.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Communications Cloud Native Core Automated Test Suite.
CVE-2022-27404: Vulnerabilidad en varios productos de Oracle Communications 22.2.1 y 22.3.0, y Oracle Fusion Middleware 8.5.6. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Communications y Oracle Fusion Middleware.
CVE-2022-25315: Vulnerabilidad en el producto Oracle Communications Cloud Native Core Binding Support Function de Oracle Communications 22.2.4. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Communications.
CVE-2022-42915: Vulnerabilidad en el producto Oracle Communications Cloud Native Core Binding Support Function de Oracle Communications 22.1.1. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Communications Cloud Native Core Binding Support Function
CVE-2022-37434: Vulnerabilidad en el producto Oracle Communications Cloud Native Core Binding Support Function de Oracle Communications 22.1.1, el producto Oracle Communications Cloud Native Core Security Edge Protection Proxy de Oracle Communications 22.3.1, el producto Oracle Communications Diameter Signaling Router de Oracle Communications 8.6.0.0, el producto Oracle Outside In Technology de Oracle Fusion Middleware 8.5.6, el producto MySQL Workbench de Oracle MySQL 8.0.31, el producto PeopleSoft Enterprise PeopleTools product de Oracle PeopleSoft 8.58, 8.59 y 8.60 y en Oracle TimesTen In-Memory Database, versiones anteriores a la 11.2.2.8.65. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer los respectivos productos mencionados.
CVE-2018-1273: Vulnerabilidad en los productos Oracle Communications Cloud Native Core Binding Support Function de Oracle Communications 22.2.0 y Oracle Healthcare Data Repository de Oracle HealthCare Applications 8.1.0.0-8.1.3.1. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer los respectivos productos mencionados.
CVE-2022-45047: Vulnerabailidad en el producto Oracle Coherence de Oracle Fusion Middleware 14.1.1.0.0, Oracle Global Lifecycle Management NextGen OUI Framework de Oracle Fusion Middleware 13.9.4.2.11, Middleware Common Libraries and Tools de Oracle Fusion Middleware 12.2.1.4.0 y 14.1.1.0.0, y en los productos OSS Support Tools product de Oracle Support Tools 2.12.43, 22.4.22.10.18 y 22.2.22.4.5. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía SSH o HTTPS (dependiendo del producto), pueda comprometer aquellos productos.
CVE-2022-23305: Vulnerabilidad en el producto Oracle Coherence de Oracle Fusion Middleware 12.2.1.3.0 and 12.2.1.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Coherence.
CVE-2022-25236: Vulnerabilidad en el producto Oracle HTTP Server de Oracle Fusion Middleware 12.2.1.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle HTTP Server.
CVE-2022-31813: Vulnerabilidad en el producto Oracle HTTP Server de Oracle Fusion Middleware 12.2.1.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle HTTP Server.
CVE-2022-40664: Vulnerabilidad en el producto Oracle WebCenter Sites de Oracle Fusion Middleware 12.2.1.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle WebCenter Sites.
CVE-2018-7489: Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware 12.2.1.3.0, 12.2.1.4.0 y 14.1.1.0.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle WebLogic Server.
CVE-2022-42920: Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware 12.2.1.3.0 y 12.2.1.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle WebLogic Server.
CVE-2022-23457: Vulnerabilidad en el producto Oracle Health Sciences Empirica Signal de Oracle Health Sciences Applications 9.1.0.52 y 9.2.0.52 y el producto Oracle Middleware Common Libraries and Tools de Oracle Fusion Middleware 12.2.1.4.0. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Health Sciences Empirica Signal y Oracle Middleware Common Libraries and Tools.
CVE-2022-23221: Vulnerabilidad en el producto Oracle Healthcare Translational Research de Oracle HealthCare Applications 4.1.0.0-4.1.1.1. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Healthcare Translational Research.
CVE-2021-31805: Vulnerabilidad en el producto Oracle Hyperion Infrastructure Technology de Oracle Hyperion 11.2.10. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Hyperion Infrastructure Technology.
CVE-2022-32221: Vulnerabilidad en el producto Oracle MySQL Server de Oracle MySQL 5.7.40 y anteriores y 8.0.31 y anteriores. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a MySQL Server.
CVE-2020-36242: Vulnerabilidad en el producto MySQL Shell product de Oracle MySQL 8.0.31. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía múltiples protocolos pueda comprometer a MySQL Shell.
CVE-2021-3918: Vulnerabilidad en el producto PeopleSoft Enterprise CC Common Application Objects de Oracle PeopleSoft 9.2. y el producto PeopleSoft Enterprise PeopleTools de Oracle PeopleSoft 8.58, 8.59 y 8.60. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a PeopleSoft Enterprise CC Common Application Objects y PeopleSoft Enterprise PeopleTools.
CVE-2022-23219: Vulnerabilidad en el producto Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers de Oracle Systems anteriores a XCP2411, XCP3111 y XCP4011. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S Servers
CVE-2020-10683: Vulnerabilidad en el producto Oracle Utilities Network Management System de Oracle Utilities Applications 2.3.0.2, 2.4.0.1, 2.5.0.0, 2.5.0.1 y 2.5.0.2. Fácil de explotar, permite que un atacante no autenticado, con acceso de red vía HTTPS, pueda comprometer a Oracle Utilities Network Management System.
Mitigación
Instalar las respectivas actualizaciones entregadas por el proveedor.
Productos afectados
Enterprise Manager Base Platform13.4.0.0, 13.5.0.0
Enterprise Manager Ops Center12.4.0.0
Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S ServersPrior to XCP2411, prior to XCP3111, prior to XCP4011
GoldenGate Stream AnalyticsPrior to 19.1.0.0.8
Java VM19c, 21c
JD Edwards EnterpriseOne OrchestratorPrior to 9.2.7.2
JD Edwards EnterpriseOne ToolsPrior to 9.2.7.2
Management Cloud Engine22.1.0.0.0
Middleware Common Libraries and Tools12.2.1.4.0, 14.1.1.0.0
MySQL Cluster7.4.38 and prior,7.5.28 and prior,7.6.24 and prior, 8.0.31 and prior
MySQL Connectors8.0.31 and prior
MySQL Enterprise Monitor8.0.32 and prior
MySQL Server5.7.40 and prior
MySQL Server5.7.40 and prior, 8.0.31 and prior
MySQL Server8.0.28 and prior
MySQL Server8.0.29 and prior
MySQL Server8.0.30 and prior
MySQL Server8.0.31 and prior
MySQL Shell8.0.31 and prior
MySQL Workbench8.0.31 and prior
Oracle Access Manager12.2.1.4.0
Oracle Agile PLM9.3.6
Oracle Applications DBA12.2.3-12.2.12
Oracle AutoVuePrior to 21.0.2.0
Oracle AutoVuePrior to 21.0.2.6
Oracle Banking Enterprise Default Management2.6.2
Oracle Banking Enterprise Default Management2.7.0
Oracle Banking Enterprise Default Management2.7.1, 2.12.0
Oracle Banking Loans Servicing2.8.0, 2.12.0
Oracle Banking Party Management2.7.0
Oracle Banking Platform2.6.2, 2.7.1, 2.9.0, 2.12.0
Oracle BI Publisher5.9.0.0.0, 6.4.0.0.0, 12.2.1.4.0
Oracle Business Intelligence Enterprise Edition5.9.0.0.0, 6.4.0.0.0
Oracle Coherence12.2.1.3.0, 12.2.1.4.0
Oracle Coherence14.1.1.0.0
Oracle Collaborative Planning12.2.3-12.2.12
Oracle Commerce Guided Search11.3.2
Oracle Communications Billing and Revenue Management12.0.0.4.0-12.0.0.7.0
Oracle Communications BRM – Elastic Charging Engine12.0.0.3.0-12.0.0.7.0
Oracle Communications Calendar Server8.0.0.6.0
Oracle Communications Cloud Native Core Automated Test Suite22.2.2, 22.3.1, 22.4.0
Oracle Communications Cloud Native Core Binding Support Function22.1.0, 22.2.0
Oracle Communications Cloud Native Core Binding Support Function22.1.1
Oracle Communications Cloud Native Core Binding Support Function22.2.0
Oracle Communications Cloud Native Core Binding Support Function22.2.0, 22.2.2, 22.3.1
Oracle Communications Cloud Native Core Binding Support Function22.2.1
Oracle Communications Cloud Native Core Binding Support Function22.2.2
Oracle Communications Cloud Native Core Binding Support Function22.2.4
Oracle Communications Cloud Native Core Binding Support Function22.3.0
Oracle Communications Cloud Native Core Binding Support Function22.3.0-22.4.0
Oracle Communications Cloud Native Core Binding Support Function22.3.2, 22.2.0
Oracle Communications Cloud Native Core Console22.3.0
Oracle Communications Cloud Native Core Console22.3.0, 22.4.0
Oracle Communications Cloud Native Core Network Data Analytics Function22.0.0.0.0
Oracle Communications Cloud Native Core Network Exposure Function22.3.1
Oracle Communications Cloud Native Core Network Exposure Function22.3.1, 22.4.0
Oracle Communications Cloud Native Core Network Function Cloud Native Environment22.3.0
Oracle Communications Cloud Native Core Network Repository Function22.3.0
Oracle Communications Cloud Native Core Network Repository Function22.3.2
Oracle Communications Cloud Native Core Network Slice Selection Function22.3.1
Oracle Communications Cloud Native Core Network Slice Selection Function22.3.1, 22.4.1
Oracle Communications Cloud Native Core Policy1.11.0
Oracle Communications Cloud Native Core Policy22.3.0
Oracle Communications Cloud Native Core Policy22.3.0, 22.4.0
Oracle Communications Cloud Native Core Security Edge Protection Proxy22.3.1
Oracle Communications Cloud Native Core Security Edge Protection Proxy22.4.0, 22.3.1
Oracle Communications Cloud Native Core Unified Data Repository22.2.2, 22.3.3
Oracle Communications Cloud Native Core Unified Data Repository22.3.3
Oracle Communications Cloud Native Core Unified Data Repository22.3.3, 22.4.0
Oracle Communications Cloud Native Core Unified Data Repository22.3.4, 22.2.3
Oracle Communications Contacts Server8.0.0.7.0
Oracle Communications Converged Application Server7.1.0, 8.0.0
Oracle Communications Convergence3.0.3.1.0
Oracle Communications Design Studio7.4.2
Oracle Communications Diameter Intelligence Hub8.2.3.0
Oracle Communications Diameter Signaling Router8.6.0.0
Oracle Communications Elastic Charging Engine12.0.0.3.0-12.0.0.7.0
Oracle Communications Elastic Charging Engine12.0.0.5.0-12.0.0.7.0
Oracle Communications Instant Messaging Server10.0.1.6.0
Oracle Communications Messaging Server8.1.0.20.0
Oracle Communications MetaSolv Solution6.3.1
Oracle Communications Order and Service Management7.4.0
Oracle Communications Performance Intelligence Center (PIC) Software10.4.0.4.1
Oracle Communications Pricing Design Center12.0.0.5.0-12.0.0.7.0
Oracle Communications Unified Assurance5.5.0-5.5.9
Oracle Communications Unified Assurance5.5.0-5.5.9, 6.0.0-6.0.1
Oracle Communications Unified Inventory Management7.4.0, 7.4.1, 7.4.2
Oracle Communications Unified Inventory Management7.4.0, 7.4.1, 7.4.2, 7.5.0
Oracle Communications Unified Inventory Management7.4.0-7.4.2, 7.5.0
Oracle Communications Unified Inventory Management7.5.0
Oracle Data Provider for .NET19c, 21c
Oracle Database – Machine Learning for Python (Python)21c
Oracle Database – Workload Manager (jackson-databind)21c
Oracle Database (Python)21c
Oracle Database (zlib)19c, 21c
Oracle Database Data Redaction19c, 21c
Oracle Database Fleet Patching (jackson-databind)21c
Oracle Database RDBMS Security19c, 21c
Oracle Demantra Demand Management12.1, 12.2
Oracle Demantra Demand Management12.2.7, 12.2.8, 12.2.9, 12.2.10, 12.2.11, 12.2.12
Oracle Documaker12.4.0-12.7.0
Oracle Essbase21.4
Oracle Financial Services Crime and Compliance Management Studio8.0.8.3.1
Oracle Fusion Middleware MapViewer12.2.1.4.0
Oracle Global Lifecycle Management NextGen OUI FrameworkPrior to 13.9.4.2.11
Oracle GraalVM Enterprise EditionOracle GraalVM Enterprise Edition: 20.3.8, 21.3.4, 22.3.0
Oracle HCM Common Architecture12.2.3-12.2.12
Oracle Health Sciences Empirica Signal9.1.0.52, 9.2.0.52
Oracle Healthcare Data Repository8.1.0.0-8.1.3.1
Oracle Healthcare Translational Research4.1.0.0-4.1.1.1
Oracle Hospitality Cruise Shipboard Property Management System20.2.2
Oracle Hospitality Gift and Loyalty9.1.0
Oracle Hospitality Labor Management9.1.0
Oracle Hospitality Reporting and Analytics9.1.0
Oracle Hospitality Simphony18.2.11, 19.3.4
Oracle HTTP Server12.2.1.4.0
Oracle Hyperion Infrastructure Technology11.2.10
Oracle iSetup12.2.3-12.2.12
Oracle iSupplier Portal12.2.6-12.2.8
Oracle Java SE, Oracle GraalVM Enterprise EditionOracle Java SE: 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4, 22.3.0
Oracle Java SE, Oracle GraalVM Enterprise EditionOracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4, 22.3.0
Oracle Java SE, Oracle GraalVM Enterprise EditionOracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4
Oracle Learning Management12.2.3-12.2.12
Oracle Marketing12.2.3-12.2.12
Oracle Middleware Common Libraries and Tools12.2.1.4.0
Oracle Mobile Field Service12.2.3-12.2.12
Oracle Outside In Technology8.5.6
Oracle Retail Service Backbone14.1.3.2, 15.0.3.1, 16.0.3
Oracle Sales for Handhelds12.2.3-12.2.12
Oracle Sales Offline12.2.3-12.2.12
Oracle Self-Service Human Resources12.2.3-12.2.12
Oracle Solaris10, 11
Oracle Stream AnalyticsPrior to 19.1.0.0.8
Oracle TimesTen In-Memory DatabasePrior to 11.2.2.8.65
Oracle Utilities Framework4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.5.0.0.0
Oracle Utilities Framework4.4.0.3.0, 4.5.0.0.0
Oracle Utilities Network Management System2.3.0.2, 2.4.0.1, 2.5.0.0, 2.5.0.1, 2.5.0.2
Oracle Utilities Network Management System2.3.0.2, 2.4.0.1, 2.5.0.0-2.5.0.2
Oracle Utilities Network Management System2.5.0.1, 2.5.0.2
Oracle VM VirtualBoxPrior to 6.1.42, prior to 7.0.6
Oracle Web Applications Desktop Integrator12.2.3-12.2.12
Oracle Web Services Manager12.2.1.4.0
Oracle WebCenter Content12.2.1.4.0
Oracle WebCenter Sites12.2.1.4.0
Oracle WebLogic Server12.2.1.3.0, 12.2.1.4.0
Oracle WebLogic Server12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
Oracle WebLogic Server14.1.1.0.0
OSS Support Tools2.12.43
OSS Support Tools22.2.22.4.5
OSS Support Tools22.4.22.10.18
PeopleSoft Enterprise CC Common Application Objects9.2
PeopleSoft Enterprise CS Academic Advisement9.2
PeopleSoft Enterprise PeopleTools8.58
PeopleSoft Enterprise PeopleTools8.58, 8.59, 8.60
PeopleSoft Enterprise PeopleTools8.59, 8.60
PeopleSoft Enterprise PeopleTools8.60
Primavera Gateway18.8.0-18.8.15, 19.12.0-19.12.15, 20.12.0-20.12.10, 21.12.0-21.12.8
Primavera Unifier18.8, 19.12, 20.12, 21.12, 22.12
ProductSupported Versions Affected
Siebel Apps – Marketing22.10 and prior
Siebel CRM22.10 and prior
Enlaces
https://www.oracle.com/security-alerts/cpujan2023.html
https://www.oracle.com/security-alerts/cpujan2023verbose.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004
Informe
El informe oficial publicado por el CSIRT del Gobierno de Chile está disponible en el siguiente enlace: 9VSA23-00774-01.