First published: Thu Oct 19 2017(Updated: )
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | ||
Oracle WebLogic Server | =10.3.6.0.0 | |
Oracle WebLogic Server | =12.1.3.0.0 | |
Oracle WebLogic Server | =12.2.1.1.0 | |
Oracle WebLogic Server | =12.2.1.2.0 | |
=10.3.6.0.0 | ||
=12.1.3.0.0 | ||
=12.2.1.1.0 | ||
=12.2.1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10271 is considered to have a high severity rating due to its potential for exploitation by unauthenticated attackers.
To fix CVE-2017-10271, apply the latest patches provided by Oracle for affected versions of WebLogic Server.
CVE-2017-10271 affects Oracle WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, and 12.2.1.2.0.
Yes, CVE-2017-10271 can be exploited remotely by an unauthenticated attacker, making it particularly dangerous.
If your system is vulnerable to CVE-2017-10271, immediately implement the recommended patches and monitor for any unusual activity.