| Vulnerability Name: | CVE-2018-2628 (CCN-141796) | ||||||||||||
| Assigned: | 2017-12-15 | ||||||||||||
| Published: | 2018-04-17 | ||||||||||||
| Updated: | 2019-04-29 | ||||||||||||
| Summary: | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | ||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
9.1 Critical (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-502 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-2628 Source: CCN Type: Oracle CPUApr2018 Oracle Critical Patch Update Advisory - April 2018 Source: CONFIRM Type: Patch, Vendor Advisory http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Source: BID Type: Third Party Advisory, VDB Entry 103776 Source: CCN Type: BID-103776 Oracle WebLogic Server CVE-2018-2628 Remote Security Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040696 Source: XF Type: UNKNOWN oracle-weblogic-cve20182628-code-exec(141796) Source: MISC Type: Broken Link https://github.com/brianwrf/CVE-2018-2628 Source: CCN Type: WeChat blog (Chinese) CVE-2018-2628 Source: CCN Type: Packet Storm Security [08-10-2018] Oracle Weblogic Server Deserialization Remote Code Execution Source: CCN Type: Packet Storm Security [03-07-2019] Oracle Weblogic Server Deserialization Remote Command Execution Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-22-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 44553 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [08-13-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 45193 Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 46513 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||