CVE-2020-14767
low-risk
Published 2020-10-21
Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hyperion BI+ accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N).
Do I need to act?
-
0.62% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.2/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Hyperion Bi\+
Affected Vendors
References (2)
Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
21
/ 100
low-risk
Severity
14/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal