Description Preview
Overview
This vulnerability affects Oracle WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, and 12.2.1.4.0. The issue exists in the Core component and is exploitable through the IIOP (Internet Inter-ORB Protocol) and T3 protocols. The vulnerability has a CVSS v3.0 Base Score of 9.8 (Critical), reflecting its high impact and ease of exploitation.
The root cause is improper validation of serialized data received via IIOP or T3 protocols, allowing attackers to send malicious serialized objects that can trigger code execution when deserialized by the server. No authentication is required to exploit this vulnerability, making it particularly dangerous for internet-facing WebLogic servers.
Exploitation can lead to complete compromise of the WebLogic Server, potentially affecting the confidentiality, integrity, and availability of the application and its data.
Remediation
- Apply the security patch from Oracle's April 2020 Critical Patch Update (CPU).
- If immediate patching is not possible, implement these mitigations:
- Block T3 and IIOP protocols at the network boundary if they're not required.
- Restrict access to the WebLogic Server admin console and T3/IIOP channels to trusted networks only.
- Configure WebLogic Server to use SSL/TLS for all communications.
- Implement a Web Application Firewall (WAF) with rules to detect and block serialization attacks.
- Monitor for exploitation attempts by reviewing server logs for suspicious T3 or IIOP traffic.
- Perform a thorough security assessment of affected systems to ensure they haven't already been compromised.
- Consider implementing a defense-in-depth approach by running WebLogic Server in a containerized or virtualized environment with limited privileges.
References
-
Oracle Critical Patch Update Advisory - April 2020: https://www.oracle.com/security-alerts/cpuapr2020.html
-
Zero Day Initiative Advisory ZDI-20-504: https://www.zerodayinitiative.com/advisories/ZDI-20-504/
-
Zero Day Initiative Advisory ZDI-20-570: https://www.zerodayinitiative.com/advisories/ZDI-20-570/
-
Packet Storm Security - WebLogic Server Deserialization Remote Code Execution: http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html
-
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Early Warning
Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.
- Armis Alert Date
- Apr 15, 2020
- CISA KEV Date
- Jan 7, 2025
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing: Medium
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- Public AdministrationPublic Administration: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- Finance and InsuranceFinance and Insurance: Low
- UtilitiesUtilities: Low
- Educational ServicesEducational Services: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- ConstructionConstruction: Low
- InformationInformation: Low
- MiningMining: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Retail TradeRetail Trade: Low
- Wholesale TradeWholesale Trade: Low