In this post, we will be discussing a newly discovered vulnerability, CVE-2022-21497, that affects the Oracle Web Services Manager (OWSM) product of Oracle Fusion Middleware. This critical vulnerability allows an unauthenticated attacker to exploit the system without being logged in. Supported versions affected are and

We will be exploring the details of this vulnerability, the manner in which it can be exploited, and the risks associated with it. We will also be providing links to relevant references and resources for further investigation.

Vulnerability Details

The Oracle Web Services Manager component, Web Services Security, of Oracle Fusion Middleware contains an easily exploitable vulnerability, CVE-2022-21497. An attacker can exploit this vulnerability through unauthenticated network access via HTTP, with the catch being that successful attacks require human interaction from a person other than the attacker.

Successful exploitation of this vulnerability could result in unauthorized creation, deletion, or modification access to critical data or all Oracle Web Services Manager accessible data. It may also lead to unauthorized access to vital data or complete access to all Oracle Web Services Manager accessible data.

The severity of this vulnerability has a CVSS 3.1 Base Score of 8.1, which categorizes it under Confidentiality and Integrity impacts. Its CVSS Vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N.

Exploit Details

While the specifics of the exploit and the code snippet are currently kept under wraps to prevent unauthorized access and potential misuse, it is essential to understand the vulnerability. Affected systems should prioritize patching and implementing necessary security measures.

To learn more about this critical vulnerability, visit the following resources

1. Original Reference for CVE-2022-21497
2. Oracle Security Alert Advisory - CVE-2022-21497
3. CVSS 3.1 Calculator


The CVE-2022-21497 vulnerability poses a significant risk to organizations that use the Oracle Web Services Manager and versions. We strongly encourage affected parties to take swift action in implementing cybersecurity measures, including prompt application of patches, security best practices, and updating systems.

Stay updated with recent security news and advisories, and always prioritize the protection and confidentiality of your organization's critical data.


Published on: 04/19/2022 21:15:00 UTC
Last modified on: 04/28/2022 15:50:00 UTC