Vulnerability Name: | CVE-2020-2883 (CCN-179781) | ||||||||||||
Assigned: | 2019-12-10 | ||||||||||||
Published: | 2020-04-14 | ||||||||||||
Updated: | 2022-10-14 | ||||||||||||
Summary: | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
9.1 Critical (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Other | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-2883 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html Source: XF Type: UNKNOWN oracle-cpuapr2020-cve20202883(179781) Source: CCN Type: Packet Storm Security [06-04-2020] WebLogic Server Deserialization Remote Code Execution Source: CCN Type: Oracle CPUApr2020 Oracle Critical Patch Update Advisory - April 2020 Source: MISC Type: Vendor Advisory https://www.oracle.com/security-alerts/cpuapr2020.html Source: CCN Type: Rapid7 Vulnerability and Exploit Database [06/04/2020] WebLogic Server Deserialization RCE BadAttributeValueExpException ExtComp Source: CCN Type: ZDI-20-504 Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability Source: MISC Type: Third Party Advisory, VDB Entry https://www.zerodayinitiative.com/advisories/ZDI-20-504/ Source: CCN Type: ZDI-20-570 Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability Source: MISC Type: Third Party Advisory, VDB Entry https://www.zerodayinitiative.com/advisories/ZDI-20-570/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |