CVE-2025-30690Improper Access Control in Corporation Oracle Solaris

Severity
7.2HIGHNVD
EPSS
0.2%
top 63.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 15

Description

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Succe

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:HExploitability: 0.6 | Impact: 6.0

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-48p8-54rv-5v4r: Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem)2025-04-15
CVEList
CVE-2025-30690: Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem)2025-04-15

📋Vendor Advisories

1
Oracle
Oracle Oracle Systems Risk Matrix: Filesystem — CVE-2025-306902025-04-15
CVE-2025-30690 — Improper Access Control | cvebase