First published: Thu Apr 19 2018(Updated: )
Oracle WebLogic Server contains an unspecified vulnerability which can allow an unauthenticated attacker with T3 network access to compromise the server.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =10.3.6.0.0 | |
Oracle WebLogic Server | =12.1.3.0.0 | |
Oracle WebLogic Server | =12.2.1.2.0 | |
Oracle WebLogic Server | =12.2.1.3 | |
Oracle WebLogic Server | ||
=10.3.6.0.0 | ||
=12.1.3.0.0 | ||
=12.2.1.2.0 | ||
=12.2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2628 is rated as critical due to its potential to allow unauthenticated attackers to compromise the Oracle WebLogic Server.
To remediate CVE-2018-2628, it is recommended to apply the latest security patches provided by Oracle for affected versions of WebLogic Server.
CVE-2018-2628 affects Oracle WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.2.0, and 12.2.1.3.
CVE-2018-2628 can be exploited by unauthenticated attackers with T3 network access to execute arbitrary code on the server.
No, CVE-2018-2628 is not a zero-day vulnerability as it has been publicly disclosed and patches are available.