Sunday, May 25, 2025
HomeCVE/vulnerabilityCritical Oracle Weblogic Flaw Let Remote Attacker Take Control of The System

Critical Oracle Weblogic Flaw Let Remote Attacker Take Control of The System

Published on

SIEM as a Service

Follow Us on Google News

In the quarterly Critical Patch Update for July 2021, Oracle has released 342 fixes for several of its products range. 

The security experts at Oracle have claimed that among those fixes there are some critical flaws, and a threat actor can easily exploit these flaws remotely.

The most critical one is the deserialization flaw through XMLDecoder in Oracle WebLogic Server Web Services, and this flaw has been tracked as “CVE-2019-2729.”

- Advertisement - Google News

Flaw profile

  • CVE ID: CVE-2019-2729
  • Affected product: Oracle WebLogic Server
  • Flaw summary: A deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services.
  • CVSS: 9.8
  • Severity: High

Oracle Weblogic Flaw

The CVE-2019-2729 is the deserialization flaw through XMLDecoder in Oracle WebLogic Server Web Services. In short, it is an RCE flaw, which means this vulnerability allows any remote attackers to exploit this critical flaw without any authentication.

Let’s keep it simple; without the username and password, a threat actor can easily exploit this security flaw and take control of the affected system.

Since this security flaw is marked as severe by the experts, that’s why they have strongly advised and recommended all the users to immediately apply the security patches.

Oracle WebLogic Server

For developing, deploying, and running Java-based applications of enterprises the Oracle WebLogic Server was used; so, it’s an application server that operates as a platform for the Java-based apps.

Within the Oracle Hyperion Infrastructure Technology, this security flaw already exist, and it has affected the following WebLogic Server versions:-

  • 11.1.2.4
  • 11.2.5.0 

Other Severe Flaws

Apart from this critical security flaw, the experts have also fixed six other severe vulnerabilities, among them, there are three that have managed to gain a score of 9.8 out of 10, and here they are mentioned below:-

Moreover, with fixes for only two flaws CVE-2021-2135 and CVE-2021-2136, Oracle released the April 2021 patch earlier this year, and to execute arbitrary code the threat actors could have abused these two vulnerabilities.

However, as a security measure and to remain protected against these vulnerabilities, the security researchers have strongly recommended all the users to immediately implement the security patches released by the company.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

NETGEAR Router Flaw Allows Full Admin Access by Attackers

A severe authentication bypass vulnerability (CVE-2025-4978) has been uncovered in NETGEAR’s DGND3700v2 wireless routers,...