CVE-2026-34312
Unauthorized Read Access via RDBMS Privilege in Oracle Database
Publication date: 2026-04-21
Last updated on: 2026-04-27
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | database_server | From 19.3 (inc) to 19.30 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the RDBMS component of Oracle Database Server versions 19.3 through 19.30. It can be exploited by a highly privileged attacker who has the Row Access Method privilege and network access through multiple protocols. The attack requires human interaction from someone other than the attacker. If successfully exploited, it allows unauthorized read access to some of the data accessible within the RDBMS.
How can this vulnerability impact me? :
The impact of this vulnerability is unauthorized read access to a subset of data within the Oracle Database Server. This means sensitive or confidential information could be exposed to attackers who have the necessary privileges and network access, potentially leading to data breaches or leakage of sensitive information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized read access to a subset of RDBMS accessible data by a high privileged attacker with Row Access Method privilege, which could potentially lead to exposure of sensitive information.
Such unauthorized data access may impact compliance with data protection regulations like GDPR and HIPAA, which require protection of personal and sensitive data from unauthorized disclosure.
However, the provided information does not specify exact compliance implications or whether this vulnerability has been linked directly to violations of these standards.