Oracle.WebLogic.PersistentContext.Insecure.Deserialization

description-logoDescription

This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
A remote attacker could exploit this vulnerability by encrypting a crafted serialized object and sending it in a crafted T3 message to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.

affected-products-logoAffected Products

Oracle WebLogic Server 10.3.6
Oracle WebLogic Server 12.1.3
Oracle WebLogic Server 12.2.1.3

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuoct2019.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-22 16.984 Name:Oracle.
Weblogic.
PersistentContext.
Insecure.
Deserialization:Oracle.
WebLogic.
PersistentContext.
Insecure.
Deserialization
2020-01-14 15.757 Default_action:pass:drop
2019-11-27 15.734
2019-11-27 15.733
2019-11-27 15.732