CVE-2026-35244
Unauthorized Data Modification Vulnerability in Oracle Hyperion Lifecycle Management
Publication date: 2026-04-21
Last updated on: 2026-05-05
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | hyperion_infrastructure_technology | 11.2.24.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized creation, deletion, or modification of critical data and unauthorized read access to some data within Oracle Hyperion Infrastructure Technology. Such unauthorized access and data manipulation can potentially lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict controls over data confidentiality and integrity.
Because the vulnerability impacts confidentiality and integrity of data, organizations using the affected version may face increased risk of data breaches or data tampering, which are significant compliance concerns under these regulations.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized creation, deletion, or modification of critical data within Oracle Hyperion Infrastructure Technology. It also allows unauthorized read access to some data. This can lead to data integrity issues, loss of critical information, and potential exposure of sensitive data.
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Hyperion Infrastructure Technology product, specifically in the Lifecycle Management component, version 11.2.24.0.000. It is an easily exploitable flaw that allows a highly privileged attacker with network access via HTTP to compromise the system. However, successful exploitation requires human interaction from someone other than the attacker.
If exploited, the attacker can gain unauthorized capabilities such as creating, deleting, or modifying critical data or any data accessible within Oracle Hyperion Infrastructure Technology. Additionally, the attacker can read some subset of the accessible data without authorization.