First published: Wed Jul 15 2020(Updated: )
Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | ||
Oracle WebLogic Server | =12.2.1.3.0 | |
Oracle WebLogic Server | =12.2.1.4.0 | |
Oracle WebLogic Server | =14.1.1.0.0 | |
=12.2.1.3.0 | ||
=12.2.1.4.0 | ||
=14.1.1.0.0 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14644 has a critical severity rating as it allows unauthenticated remote code execution.
To fix CVE-2020-14644, you should apply the latest security patches provided by Oracle for the affected versions of WebLogic Server.
CVE-2020-14644 affects Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0.
Yes, CVE-2020-14644 can be exploited remotely by attackers with network access via T3 or IIOP.
CVE-2020-14644 is a deserialization vulnerability that allows for remote code execution.