CVE-2026-34320
Unauthorized Access via UI Vulnerability in Oracle Financial Screening
Publication date: 2026-04-21
Last updated on: 2026-04-27
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | financial_services_customer_screening | 8.1.2.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Financial Services Customer Screening product, specifically in the User Interface component of version 8.1.2.8.0. It is easily exploitable by an unauthenticated attacker who has network access via HTTP. The attacker can compromise the system without needing any privileges or user interaction.
Successful exploitation can lead to unauthorized access to critical or all accessible data within Oracle Financial Services Customer Screening.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily on confidentiality. An attacker can gain unauthorized access to sensitive and critical data within the Oracle Financial Services Customer Screening system.
This could lead to exposure of confidential customer information or other critical data, potentially resulting in data breaches or misuse of sensitive information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated attacker with network access to gain unauthorized access to critical or all accessible data within Oracle Financial Services Customer Screening. Such unauthorized access to sensitive data can lead to violations of data protection regulations and standards such as GDPR and HIPAA, which require strict controls to protect personal and sensitive information.
Therefore, exploitation of this vulnerability could result in non-compliance with these regulations due to potential data breaches and unauthorized disclosure of protected information.