CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
100.0%
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 329 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at January 2021 Critical Patch Update: Executive Summary and Analysis.
Please note that since the release of the October 2020 Critical Patch Update, Oracle has released a Security Alert for Oracle WebLogic Server:CVE-2020-14750 (November 1, 2020). Customers are strongly advised to apply this Critical Patch Update, which includes patches for this Alert as well as additional patches.
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | communications_calendar_server | * | cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:* |
oracle | communications_contacts_server | * | cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:* |
oracle | communications_metasolv_solution | * | cpe:2.3:a:oracle:communications_metasolv_solution:*:*:*:*:*:*:*:* |
oracle | communications_network_charging_and_control | * | cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:* |
oracle | communications_brm_-_elastic_charging_engine | * | cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:* |
oracle | communications_asap | * | cpe:2.3:a:oracle:communications_asap:*:*:*:*:*:*:*:* |
oracle | communications_operations_monitor | * | cpe:2.3:a:oracle:communications_operations_monitor:*:*:*:*:*:*:*:* |
oracle | communications_diameter_signaling_router_\(dsr\) | * | cpe:2.3:a:oracle:communications_diameter_signaling_router_\(dsr\):*:*:*:*:*:*:*:* |
oracle | communications_application_session_controller | * | cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:* |
oracle | communications_element_manager | * | cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
100.0%