First published: Fri Aug 31 2007(Updated: )
The SSL client implementation in BEA WebLogic Server 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0 sometimes selects the null cipher when others are available, which might allow remote attackers to intercept communications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | <=9.2 | |
Oracle WebLogic Server | =7.0-sp7 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =8.1-sp4 | |
Oracle WebLogic Server | =8.1-sp5 | |
Oracle WebLogic Server | =8.1-sp6 | |
Oracle WebLogic Server | =9.0 | |
Oracle WebLogic Server | =9.1 | |
Oracle WebLogic Server | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4615 is considered a critical vulnerability due to its potential for remote exploitation.
To fix CVE-2007-4615, apply the latest security patches provided by Oracle for all affected versions.
CVE-2007-4615 affects BEA WebLogic Server versions 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0.
Exploiting CVE-2007-4615 can allow attackers to intercept communications between the client and server.
While the best approach is to apply patches, temporarily disabling SSL and using alternative secure communication methods may reduce risk.