Oracle.WebLogic.ExtractorComparator.Insecure.Deserialization

description-logoDescription

This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
A remote attacker could exploit this vulnerability by encrypting a crafted serialized object and sending it in a crafted T3 message to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.

description-logoOutbreak Alert

Known exploited vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware. This vulnerability allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data on the Oracle WebLogic Server and the confidentiality impact of the vulnerability is rated as "High".

View the full Outbreak Alert Report

affected-products-logoAffected Products

Oracle WebLogic Server 10.3.6.0.0
Oracle WebLogic Server 12.1.3.0.0
Oracle WebLogic Server 12.2.1.3.0
Oracle WebLogic Server 12.2.1.4.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuapr2020.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-22 16.984 Name:Oracle.
Weblogic.
ExtractorComparator.
Insecure.
Deserialization:Oracle.
WebLogic.
ExtractorComparator.
Insecure.
Deserialization
2020-05-26 15.851 Default_action:pass:drop
2020-05-14 15.845