Security for everyone

CVE-2020-9315 Scanner

Detects 'Improper Access Control' vulnerability in Oracle iPlanet Web Server affects v. 7.0.x.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one


Parent Category

CVE-2020-9315 Scanner Detail

Oracle iPlanet Web Server is a product that was used for web server and application server purposes. Developed by Oracle, it was designed to handle a wide range of tasks such as serving media files, hosting complex applications, and running websites for businesses. It was a popular product due to its security and scalability features, but now it is no longer supported by the vendor. 

CVE-2020-9315 is a vulnerability that was detected in Oracle iPlanet Web Server 7.0.x. The vulnerability relates to the incorrect access control for admingui/version URIs in the Administration console. This flaw allowed for unauthenticated read access to encryption keys. The root of this vulnerability lies in the poor access control mechanisms deployed within this version of the web server. 

Exploitation of this vulnerability can lead to a serious compromise of sensitive information that is stored within the web server. Encryption keys can be read and used for malicious purposes, thereby putting the entire server at risk. Cybercriminals can use these communication keys to access sensitive data such as login details, personal information, and confidential business data. The exploitation of this vulnerability can lead to severe reputational and financial damage for businesses. 

In conclusion, it's important to be aware of vulnerabilities in your digital assets. With the pro features of the platform, businesses can easily and quickly learn about vulnerabilities in their web servers, applications, and other digital assets. By staying informed and implementing the right measures, businesses can protect themselves against potential risks and maintain their reputation and financial security.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture