Oracle.WebLogic.SOAPInvokeState.Insecure.Deserialization

description-logoDescription

This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
This vulnerability is due to insufficient validation of T3 requests. A remote attacker could exploit this vulnerability by encrypting a crafted serialized object and embedding it in the serialized object and then sending it in a T3 message to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.

affected-products-logoAffected Products

Oracle WebLogic Server 10.3.6
Oracle WebLogic Server 12.1.3
Oracle WebLogic Server 12.2.1.3
Oracle WebLogic Server 12.2.1.4

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuapr2020.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-05-14 15.845 Default_action:pass:drop
2020-05-05 15.835