{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20953","assignerOrgId":"43595867-4340-4103-b7a2-9a5208d29a85","state":"PUBLISHED","assignerShortName":"oracle","dateReserved":"2023-12-07T22:28:10.627Z","datePublished":"2024-02-17T01:50:16.976Z","dateUpdated":"2025-10-21T23:05:24.157Z"},"containers":{"cna":{"providerMetadata":{"orgId":"43595867-4340-4103-b7a2-9a5208d29a85","shortName":"oracle","dateUpdated":"2024-02-17T01:50:16.976Z"},"problemTypes":[{"descriptions":[{"lang":"en-US","description":"Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM."}]}],"affected":[{"vendor":"Oracle Corporation","product":"Agile PLM Framework","versions":[{"version":"9.3.6","status":"affected"}]}],"descriptions":[{"lang":"en-US","value":"Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Export).   The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM.  Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."}],"references":[{"url":"https://www.oracle.com/security-alerts/cpujan2024.html","name":"Oracle Advisory","tags":["vendor-advisory"]}],"metrics":[{"cvssV3_1":{"attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:06:37.367Z"},"title":"CVE Program Container","references":[{"url":"https://www.oracle.com/security-alerts/cpujan2024.html","name":"Oracle Advisory","tags":["vendor-advisory","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-20953","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-24T16:13:38.260276Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-02-24","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20953"}}}],"affected":[{"cpes":["cpe:2.3:a:oracle:agile_plm_framework:9.3.6:*:*:*:*:*:*:*"],"vendor":"oracle","product":"agile_plm_framework","versions":[{"status":"affected","version":"9.3.6"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-096/"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20953","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data"}]}],"timeline":[{"time":"2025-02-24T00:00:00.000Z","lang":"en","value":"CVE-2024-20953 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:24.157Z"}}]}}