Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2012-3137Improper Authentication in Oracle Database Server

Severity
6.4MEDIUMNVD
EPSS
54.9%
top 1.94%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 21
Latest updateMay 17

Description

The authentication protocol in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to conduct brute force password guessing attacks, aka "stealth password cracking vulnerability."

CVSS vector

AV:N/AC:L/C:P/I:P/A:NExploitability: 10.0 | Impact: 4.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5gqh-48pf-m5xx: The authentication protocol in Oracle Database Server 102022-05-17
CVEList
CVE-2012-3137: The authentication protocol in Oracle Database Server 102012-09-21

💥Exploits & PoCs

1
Exploit-DB
Oracle Database - Protocol Authentication Bypass2012-10-18

💬Community

1
Bugzilla
CVE-2012-3137 oracle-server: Authentication protocol allows session key and salt for arbitrary users ("stealth password cracking vulnerability")2012-09-24
CVE-2012-3137 — Improper Authentication in Oracle | cvebase