Oracle.WebLogic.SOAPInvokeState.Insecure.Deserialization
Description
This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
This vulnerability is due to insufficient validation of T3 requests. A remote attacker could exploit this vulnerability by encrypting a crafted serialized object and embedding it in the serialized object and then sending it in a T3 message to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.
Affected Products
Oracle WebLogic Server 10.3.6
Oracle WebLogic Server 12.1.3
Oracle WebLogic Server 12.2.1.3
Oracle WebLogic Server 12.2.1.4
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuapr2020.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |