Oracle.WebLogic.RemoteConstructor.Insecure.Deserialization
Description
This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
This vulnerability is due to insufficient validation of T3 and IIOP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a T3 or IIOP request containing a crafted serialized object which contains a UniversalExtractor object. Successful exploitation results in the execution of arbitrary code under the security context of the user running WebLogic.
Affected Products
Oracle WebLogic Server 12.2.1.3
Oracle WebLogic Server 12.2.1.4
Oracle WebLogic Server 14.1.1.0.0
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpujul2020.html#AppendixFMW
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-09-30 | 16.934 | Sig Added |
2020-09-14 | 16.922 | Default_action:pass:drop |
2020-09-01 | 15.915 |