A critical vulnerability (CVE-2023-22069) has been discovered in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). This high-risk vulnerability affects supported versions 220.127.116.11. and 14.1.1.., and allows an unauthenticated attacker to compromise Oracle WebLogic Server with network access via T3 and IIOP. Successful attacks could lead to a full takeover of Oracle WebLogic Server. The CVSS 3.1 Base Score is calculated at 9.8 out of 10, which reflects the severity, as it impacts Confidentiality, Integrity, and Availability domains. The CVSS Vector is as follows: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
This vulnerability allows an unauthenticated attacker with network access (via T3 or IIOP) to exploit it, which could result in a compromise of Oracle WebLogic Server. For an attacker to exploit this vulnerability, they do not need to provide any credentials or have any specific privileges on the targeted system.
While the exact exploit code is not provided here to avoid unintended malicious use, a Python POC (Proof of Concept) code snippet can be found on GitHub here: [Link to the original reference for the exploit code]
Oracle has released a security advisory related to this vulnerability, which can be found in the following link: [Link to the original Oracle Security Advisory]
Oracle has released a patch to address this critical vulnerability in the affected versions of Oracle WebLogic Server. It is highly recommended for users to apply this patch as soon as possible:
The CVE-2023-22069 vulnerability in Oracle WebLogic Server is a critical issue that allows unauthenticated remote attackers to compromise and potentially take over affected systems. Organizations running Oracle WebLogic Server, especially those using versions 18.104.22.168. and 14.1.1.., are advised to quickly apply the available patch and follow recommended security best practices to protect their systems.
Published on: 10/17/2023 22:15:12 UTC
Last modified on: 10/23/2023 18:19:30 UTC