9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Recent assessments:
hrbrmstr at May 02, 2020 12:18am UTC reported:
Well, itās bad when even Oracle decides to raise the alarm bells (wayback machine was down, so no permalink yet) about it.
Theyāve detected active exploitation attempts against WebLogic servers.
T3 is Weblogicās proprietary implementation of the RMI spec and is primarily used as a layer to enable JNDI calls by apps/clients.
It appears thereās PoC for it but I havenāt tested it yet. Since itās yet-another deserialization vulnerability and thereās existing PoC code for similar RMI RCE, Oracleās observations are likely correct.
space-r7 at May 15, 2020 7:15pm UTC reported:
Well, itās bad when even Oracle decides to raise the alarm bells (wayback machine was down, so no permalink yet) about it.
Theyāve detected active exploitation attempts against WebLogic servers.
T3 is Weblogicās proprietary implementation of the RMI spec and is primarily used as a layer to enable JNDI calls by apps/clients.
It appears thereās PoC for it but I havenāt tested it yet. Since itās yet-another deserialization vulnerability and thereās existing PoC code for similar RMI RCE, Oracleās observations are likely correct.
Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 4
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P