Impact
The Oracle Solaris driver vulnerability allows an attacker who has high‑level local privileges on the affected system to create, modify, or delete critical data. Once the attacker logs on to the infrastructure, the flaw does not require remote access, but it does require a single successful interaction from a user other than the attacker to trigger the exploitation. The impact is full confidentiality and integrity compromise of all Solaris‑accessible data.
Affected Systems
Oracle Solaris 11.x is the affected product. The vulnerability involves the Solaris driver component referenced in the advisory, and no other versions such as Solaris 10.x are impacted.
Risk and Exploitability
The CVSS score of 5.8 indicates moderate severity, with high confidentiality and integrity impacts but no availability impact. The EPSS score of less than 1% suggests that the exploitation likelihood is very low at the moment. Oracle has not listed this vulnerability in its KEV catalog, so there are no active, publicly known exploits. Nevertheless, the local attack vector with high privileges and the need for a secondary user interaction means that an attacker who can gain a foothold into the environment and convince a legitimate user to perform an action could compromise the Solaris system. The risk remains for the unpatched 11.x releases until a patch or workaround is applied.
OpenCVE Enrichment