{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T12:32:40.783","vulnerabilities":[{"cve":{"id":"CVE-2022-21420","sourceIdentifier":"secalert_us@oracle.com","published":"2022-04-19T21:15:14.843","lastModified":"2024-11-21T06:44:39.603","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."},{"lang":"es","value":"Una vulnerabilidad en el producto Oracle Coherence de Oracle Fusion Middleware (componente: Core). Las versiones compatibles que están afectadas son 12.2.1.3.0, 12.2.1.4.0 y 14.1.1.0.0. La vulnerabilidad fácilmente explotable permite a un atacante no autenticado con acceso a la red por medio de T3 comprometer Oracle Coherence. Los ataques con éxito de esta vulnerabilidad pueden resultar en la toma de control de Oracle Coherence. CVSS 3.1, Puntuación base 9.8 (impactos en la Confidencialidad, Integridad y Disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)"}],"metrics":{"cvssMetricV31":[{"source":"secalert_us@oracle.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:coherence:12.2.1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"956B2712-8FB5-4FBF-A7FF-8930C05677FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*","matchCriteriaId":"2FF57C7A-92C9-4D71-A7B1-CC9DEFAA8193"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"5FA64A1D-34F9-4441-857A-25C165E6DBB6"}]}]}],"references":[{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}