Impact
The vulnerability in Oracle Database Server’s RDBMS component allows a high‑privileged attacker who already possesses a Row Access Method privilege to read data stored within the database. To succeed the attacker must have network access through any of the supported protocols and the attack requires human interaction with a user other than the attacker. The impact is confined to confidentiality, with no direct effect on integrity or availability.
Affected Systems
Oracle Database Server versions 19.3 up to and including 19.30 are affected. These releases are currently supported and are the only ones identified for this vulnerability.
Risk and Exploitability
The CVSS 3.1 base score of 2.4 indicates a low severity vulnerability that impacts confidentiality only. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, suggesting a limited likelihood of widespread exploitation. The exploit requires both network connectivity and privileged access, and also a second human actor, which further reduces the practical feasibility of an attack. However, in environments where the Row Access Method privilege is granted broadly, the potential for unauthorized read of data remains a concern.
OpenCVE Enrichment