HomeCII/OTCERT-In identifies vulnerability in Oracle Agile PLM (CVE-2024-21287)

CERT-In identifies vulnerability in Oracle Agile PLM (CVE-2024-21287)

Published on

spot_img

CERT-In, India’s Computer Emergency Response Team, has recently identified a security vulnerability in Oracle’s Agile Product Lifecycle Management (PLM) software. This vulnerability, designated as CVE-2024-21287, was discovered on November 26, 2024, and has been classified as a high-risk threat. The affected software version is Oracle Agile PLM Framework 9.3.6, which is widely utilized by organizations for managing product lifecycles, streamlining development processes, and enhancing collaboration.

The Oracle Agile PLM vulnerability, CVE-2024-21287, is categorized as an Information Disclosure Vulnerability. This flaw could potentially enable an authenticated remote attacker to gain unauthorized access to sensitive data stored within Oracle Agile PLM systems. If successfully exploited, this vulnerability poses a serious risk of exposing critical system information, leading to data breaches, intellectual property theft, and unauthorized manipulation of PLM data.

The severity and impact of this vulnerability have raised concerns within the cybersecurity community, with CERT-In highlighting the potential for data exfiltration as a significant consequence. Exploiting CVE-2024-21287 could allow malicious actors to extract confidential information for financial gain, industrial espionage, or operational sabotage. The high severity rating of this vulnerability stems from its ability to bypass authentication protocols, making it remotely exploitable without the need for valid user credentials. This increases the likelihood of successful exploitation by attackers targeting enterprise data and critical systems.

End-user organizations utilizing Oracle Agile PLM in their workflows are particularly vulnerable to this security threat. Businesses relying on Oracle Agile for managing product development and supply chain operations face significant risks, as the confidentiality and integrity of product-related data are paramount. Exploitation of this vulnerability could result in unauthorized access to sensitive files, compromising both the security of product information and the stability of the entire product lifecycle management process.

In response to this security issue, Oracle has issued a security alert urging customers to update their systems to Oracle Agile PLM Framework version 9.3.6 with the latest security patches. These patches are essential for addressing the Information Disclosure Vulnerability identified in the framework and preventing unauthorized access or data leaks. Oracle has emphasized the importance of applying these security updates promptly to mitigate any risks associated with the vulnerability. Users are encouraged to upgrade to supported versions of Agile PLM to ensure protection against potential security threats.

The vulnerability, CVE-2024-21287, has been rated using the Common Vulnerability Scoring System (CVSS) version 3.1, with a base score of 7.5 indicating a high level of risk. The attack vector involves low complexity, meaning that it does not require specialized knowledge or extensive technical expertise to exploit. The vulnerability primarily affects Oracle Agile PLM Framework’s Software Development Kit (SDK) and Process Extension, critical components of the PLM solution.

In conclusion, organizations using Oracle Agile Product Lifecycle Management are advised to install the latest patches to protect their sensitive data. Upgrading to supported releases is crucial for safeguarding PLM systems, especially for versions under Oracle’s Premier Support and Extended Support. Enhancing security protocols, such as implementing multi-factor authentication and network monitoring, can further reduce risks and ensure the long-term stability of PLM systems. By staying current with Oracle’s updates and proactively addressing security vulnerabilities, businesses can mitigate potential threats and safeguard their critical data.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...