Remote Command Execution Vulnerability in Oracle WebLogic Server
CVE-2023-21931
7.5HIGH
Summary
A vulnerability exists within Oracle WebLogic Server that allows an unauthenticated attacker with network access via T3 to exploit the system. This weakness can enable unauthorized access to sensitive data or, in some cases, give an attacker complete control over all data accessible within the Oracle WebLogic Server environment. The supported versions affected by this issue are 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0. It is crucial for organizations operating these versions to apply the appropriate patches to mitigate potential risks.
Affected Version(s)
WebLogic Server 12.2.1.3.0
WebLogic Server 12.2.1.4.0
WebLogic Server 14.1.1.0.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database0 Proof of Concept(s)