Oracle

Oracle has released patches for a security issue affecting the Oracle Identity Manager that has received a rare 10 out of 10 score on the CVSSv3 bug severity scale.

The giant software maker has remained tight-lipped about the issue and has not released any type of meaningful explanation in an attempt to delay the start of attacks trying to exploit this flaw as long as possible, giving customers more time to patch.

No-password default account found in OIM middleware

The affected product is Oracle Identity Manager (OIM), a user management solution that allows enterprises to control what parts of their network employees can access. OIM is part of Oracle's highly popular Fusion Middleware offering and is one of its most used components.

Wiz

Oracle describes the issue — tracked under the CVE-2017-10151 identifier — as a "default account" vulnerability, an umbrella term that's usually used to describe accounts with no password or hardcoded credentials (a.k.a. backdoor accounts).

"This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials," Oracle said in a security alert.

While other companies were also caught including default accounts, usually included for debugging purposes, most are only accessible locally and at least have a password. Having a no-password default account accessible via the Internet is a terrible idea or a huge oversight.

Oracle has released patches

Oracle released patches last Friday. Oracle Identity Manager versions 11.1.1.7, 11.1.1.9, 11.1.2.1.0, 11.1.2.2.0, 11.1.2.3.0, and 12.2.1.3.0 are confirmed affected but Oracle says previous versions may also be vulnerable.

On October 16, Oracle released the October 2017 Critical Patch Update (CPU) trimestrial update train. The company fixed 252 bugs. CVE-2017-10151 was not one of them. Users employing Oracle middleware are advised to read the company's most recent security alert for OIM patching instructions, and install the October 2017 CPU while they're at it.

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Related Articles:

MongoDB warns admins to patch severe vulnerability immediately

Korean Air data breach exposes data of thousands of employees

FBI and CISA warn of state hackers attacking Fortinet FortiOS servers

University of Phoenix data breach impacts nearly 3.5 million individuals

University of Phoenix discloses data breach after Oracle hack