### [CVE-2017-3537](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3537) ![](https://img.shields.io/static/v1?label=Product&message=Real-Time%20Scheduler&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202.2.0.3.13%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20%22exploitable%22%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Real-Time%20Scheduler.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Real-Time%20Scheduler%2C%20attacks%20may%20significantly%20impact%20additional%20products.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Real-Time%20Scheduler%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Real-Time%20Scheduler%20accessible%20data.&color=brighgreen) ### Description Vulnerability in the Oracle Real-Time Scheduler component of Oracle Utilities Applications (subcomponent: Mobile Communications Platform). Supported versions that are affected are 2.2.0.3.13, 2.3.0.0 and 2.3.0.1. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Real-Time Scheduler. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Real-Time Scheduler, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Real-Time Scheduler accessible data as well as unauthorized read access to a subset of Oracle Real-Time Scheduler accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ### POC #### Reference - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html #### Github No PoCs found on GitHub currently.