Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe
  • Twitter
  • Facebook
  • LinkedIn

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle addresses over 250 CVEs in its second quarterly update of 2021 with 390 patches, including 34 critical updates.

Background

On April 20, Oracle released its Critical Patch Update (CPU) for April 2021, the second quarterly update of the year. This CPU update contains fixes for 257 CVEs in 390 security updates across 32 Oracle product families. Out of the 390 security updates published this quarter, over 50% were assigned a high severity. Critical vulnerabilities only accounted for eight percent of the security updates patched this quarter.

Analysis

This quarter’s update includes fixes for 34 critical issues across 30 CVEs. The Oracle E-Business Suite product family contained the highest number of patches at 70, representing just shy of 18% of the patches from this quarter. Of those 70 patches, 22 issues are remotely exploitable without authentication.

As we’ve seen with past CPUs, Oracle Fusion Middleware continues to take the lead in the number of vulnerabilities which can be exploited by unauthenticated attackers, as 36 of the 45 patches meet this criteria. A full breakdown of the patches can be seen in the table below:

Oracle Product Family Number of Patches Remote Exploit without Auth
Oracle E-Business Suite 70 22
Oracle MySQL 39 10
Oracle Fusion Middleware 45 36
Oracle Retail Applications 35 31
Oracle Virtualization 24 5
Oracle Communications 22 9
Oracle PeopleSoft 18 13
Oracle Financial Services Applications 15 10
Oracle Communications Applications 13 12
Oracle Database Server 10 4
Oracle JD Edwards 10 10
Oracle Enterprise Manager 9 8
Oracle Construction and Engineering 8 6
Oracle Siebel CRM 8 7
Oracle Hospitality Applications 6 4
Oracle Storage Gateway 6 2
Oracle Supply Chain 5 5
Oracle Systems 5 1
Oracle Utilities Applications 5 5
Oracle NoSQL Database 4 3
Oracle Commerce 4 4
Oracle Java SE 4 4
Oracle Health Sciences Applications 3 3
Oracle Spatial Studio 2 1
Oracle Food and Beverage Applications 2 1
Oracle Hyperion 2 1
Oracle Global Lifecycle Management 1 1
Oracle REST Data Services 1 1
Oracle SQL Developer 1 1
Oracle iLearning 1 0
Oracle Insurance Applications 1 1
Oracle Support Tools 1 0

Five 10.0 CVSSv3 Scoring Vulnerabilities

This quarter Oracle includes patches to address five CVEs, with the highest severity CVSSv3 score of 10.0. This includes the critical Zerologon vulnerability (CVE-2020-1472). These flaws could be exploited by unauthenticated, remote attackers and should be prioritized for patching. The table below outlines each affected Product and CVE:

CVE Oracle Product Family Oracle Product and Component
CVE-2021-2177 Oracle Virtualization Oracle Secure Global Desktop / Gateway
CVE-2021-2248 Oracle Virtualization Oracle Secure Global Desktop / Server
CVE-2020-1472 Oracle Systems Oracle ZFS Storage Appliance Kit / Operating System Image
CVE-2021-2317 Oracle Storage Gateway Oracle Cloud Infrastructure Storage Gateway / Management Console
CVE-2021-2256 Oracle Storage Gateway Oracle Storage Cloud Software Appliance / Management Console

Proof of concept

At the time this blog was written, several of the highest severity (CVSSv3 9.8 and 10.0) CVE’s have published proof-of-concept (PoC) scripts. While all of these have not been tested or verified by Tenable, we would recommend taking action to patch the flaws as soon as possible. The following table lists some of the CVEs that currently have published PoCs:

CVE Oracle Product and Component PoC Links
CVE-2020-1472 Oracle ZFS Storage Appliance Kit / Operating System Image GitHub
CVE-2020-17530 MySQL Enterprise Monitor / Monitoring: General (Apache Struts) Oracle Hospitality OPERA 5 / Login (Apache Struts) GitHub
CVE-2019-17495 Oracle Utilities Framework / General (Swagger UI) GitHub
CVE-2019-17195 Enterprise Manager Base Platform / Enterprise Manager Install (Nimbus JOSE+JWT) GitHub

Solution

Customers are advised to apply all relevant patches in this quarter’s CPU. Please refer to the April 2021 advisory for full details.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 30-day trial of Tenable.io Vulnerability Management.

Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.