Tuesday, February 11, 2025
HomeCVE/vulnerabilityOracle Warns Active Exploitation of Recently Patched WebLogic RCE Flaw

Oracle Warns Active Exploitation of Recently Patched WebLogic RCE Flaw

Published on

SIEM as a Service

Follow Us on Google News

Oracle warned that hackers actively attempting to exploit recently patched vulnerability CVE-2020-2883, which affects multiple versions of Oracle WebLogic Server.

Oracle patched the vulnerability as a part of the April 2020 Critical Patch Update which resolves more than 405 vulnerabilities, including CVE-2020-2883.

WebLogic Server Flaw – CVE-2020-2883

The vulnerability allows attackers to execute arbitrary code on an affected version of the Oracle WebLogic without authentication.

The vulnerability resides with Oracle’s proprietary T3 protocol, can be triggered with crafted data in a T3 protocol message leads to deserialization of untrusted data, reads ZDI’s advisory.

An attacker can leverage the vulnerability to execute the code in the context of the current process.

A security researcher claims to have a valid proof-of-concept code to exploit the bug and have published it on GitHub.

The published exploit covers the following vulnerabilities CVE-2020-2546, CVE-2020-2915, CVE-2020-2801, CVE-2020-2798, CVE-2020-2883, CVE-2020-2884, CVE-2020-2950.

Oracle Director of Security Assurance Eric Maurice, said that “they have recently received reports of attempts to maliciously exploit several recently-patched vulnerabilities, including vulnerability CVE-2020-2883, which affects multiple versions of Oracle WebLogic Server.”

Attackers can exploit the vulnerability to breach the corporate networks and to deploy malware.

Oracle strongly recommends customers to apply the April 2020 Critical Patch Update which covers 405 new security patches.

Vulnerabilities with WebLogic Server are not uncommon, Oracle WebLogic vulnerabilities exploited by threat actors to deploy ransomware and crypto miners.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks

A severe security vulnerability has been uncovered in the popular video game Marvel Rivals, raising...

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform,...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...