Service Notices

All Notices > Security Notices > WebLogic Remote Code Execution Vulnerabilities (CVE-2020-2801, CVE-2020-2883, and CVE-2020-2884)

WebLogic Remote Code Execution Vulnerabilities (CVE-2020-2801, CVE-2020-2883, and CVE-2020-2884)

Apr 20, 2020 GMT+08:00

I. Overview

Oracle officially released a patch update notice for April and disclosed a few high-risk vulnerabilities, including three important RCE vulnerabilities (CVE-2020-2801, CVE-2020-2883, and CVE-2020-2884) on WebLogic Server. The T3 protocol is enabled on WebLogic Server by default. Attackers can use the deserialization vulnerability of the T3 protocol to remotely execute arbitrary code.

If you are a WebLogic Server user, check your version and implement timely security hardening.

Reference links:

https://www.oracle.com/security-alerts/cpuapr2020.html

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected Versions:

WebLogic 10.3.6.0.0

WebLogic 12.1.3.0.0

WebLogic 12.2.1.3.0

WebLogic 12.2.1.4.0

IV. Vulnerability Handling

1. Patch upgrade: These vulnerabilities have been fixed in the officially released patch. Use a licensed account to log in to https://support.oracle.com and download the latest patch

2. Workaround: Disable the T3 protocol to mitigate risks.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.