Oracle.WebLogic.LockVersionExtractor.Insecure.Deserialization

description-logoDescription

This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
A remote attacker could exploit this vulnerability by encrypting a crafted serialized object and sending it in a crafted T3 message to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.

affected-products-logoAffected Products

Oracle WebLogic Server 12.2.1.3.0
Oracle WebLogic Server 12.2.1.4.0
Oracle WebLogic Server 14.1.1.0.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuoct2020.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-22 16.984 Name:Oracle.
Weblogic.
LockVersionExtractor.
Insecure.
Deserialization:Oracle.
WebLogic.
LockVersionExtractor.
Insecure.
Deserialization
2020-12-16 16.981 Sig Added
2020-11-24 16.967 Default_action:pass:drop
2020-11-09 16.958