First published: Wed Oct 21 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the T3 protocol. Crafted data in a T3 protocol message can trigger the deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =12.2.1.3.0 | |
Oracle WebLogic Server | =12.2.1.4.0 | |
Oracle WebLogic Server | =14.1.1.0.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14825 is considered critical due to its potential for remote code execution without authentication.
To fix CVE-2020-14825, apply the latest security patches from Oracle for the affected versions of Oracle WebLogic Server.
CVE-2020-14825 affects Oracle WebLogic Server versions 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0.
Exploitation of CVE-2020-14825 could allow attackers to execute arbitrary code, potentially compromising the entire server.
No, authentication is not required to exploit CVE-2020-14825, making it particularly dangerous.