CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
100.0%
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 349 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at July 2022 Critical Patch Update: Executive Summary and Analysis.
Please note that since the release of the April 2022 Critical Patch Update, Oracle has released a Security Alert for Oracle E-Business SuiteCVE-2022-21500 (May 19, 2022). Customers are strongly advised to apply the July 2022 Critical Patch Update for Oracle E-Business Suite, which includes patches for this Alert as well as additional patches.
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | big_data_spatial_and_graph | * | cpe:2.3:a:oracle:big_data_spatial_and_graph:*:*:*:*:*:*:*:* |
oracle | essbase | * | cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:* |
oracle | global_lifecycle_management_opatch | * | cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* |
oracle | goldengate | * | cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:* |
oracle | stream_analytics | * | cpe:2.3:a:oracle:stream_analytics:*:*:*:*:*:*:*:* |
oracle | graph_server_and_client | * | cpe:2.3:a:oracle:graph_server_and_client:*:*:*:*:*:*:*:* |
oracle | rest_data_services | * | cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:* |
oracle | spatial_studio | * | cpe:2.3:a:oracle:spatial_studio:*:*:*:*:*:*:*:* |
oracle | timesten_in-memory_database | * | cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* |
oracle | commerce_guided_search | * | cpe:2.3:a:oracle:commerce_guided_search:*:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
100.0%