CVE-2025-30750
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-15

Last updated on: 2025-07-29

Assigner: Oracle

Description
Vulnerability in the Unified Audit component of Oracle Database Server. Supported versions that are affected are 19.3-19.27, 21.3-21.18 and 23.4-23.8. Easily exploitable vulnerability allows high privileged attacker having Create User privilege with network access via Oracle Net to compromise Unified Audit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Unified Audit accessible data. CVSS 3.1 Base Score 2.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-15
Last Modified
2025-07-29
Generated
2026-05-07
AI Q&A
2025-07-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
oracle database_server From 19.3 (inc) to 19.27 (inc)
oracle database_server From 21.3 (inc) to 21.18 (inc)
oracle database_server From 23.4 (inc) to 23.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Unified Audit component of Oracle Database Server. It affects certain supported versions and allows a high privileged attacker with Create User privilege and network access via Oracle Net to compromise the Unified Audit. The attack requires human interaction from someone other than the attacker. Successful exploitation can lead to unauthorized update, insert, or delete access to some data accessible by Unified Audit.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker with sufficient privileges and network access to modify audit data in the Unified Audit component. This unauthorized modification can affect the integrity of audit records, potentially hiding malicious activities or altering audit trails.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart