Published Tue, Sep 20th, 2022
Platforms
Any unattached storage volume, or attached storage volumes allowing multi-attachment, could have been read from or written to as long as an attacker knew their Oracle Cloud Identifier (OCID), allowing sensitive data to be exfiltrated or even more impactful attacks to be initiated via executable file manipulation in the target tenant's environment.
OCI Volumes
None required.
No tracked CVEs
Contributed by https://github.com/nirohfeld
Entry Status
Finalized
Disclosure Date
Thu, Jun 9th, 2022
Exploitability Period
-
Known ITW Exploitation
-
Detection Methods
None
Piercing Index Rating
-
Discovered by
Elad Gabay, Wiz