Intrusion Prevention

Oracle.Weblogic.PersistentContext.Insecure.Deserialization

Description

This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Oracle WebLogic Server.
A remote attacker could exploit this vulnerability by encrypting a crafted serialized object and sending it in a crafted T3 message to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.

Affected Products

Oracle WebLogic Server 10.3.6
Oracle WebLogic Server 12.1.3
Oracle WebLogic Server 12.2.1.3

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuoct2019.html

CVE References

CVE-2019-2890