First published: Sat Feb 17 2024(Updated: )
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =12.2.1.4.0 | |
Oracle WebLogic Server | =14.1.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20931 is considered a high severity vulnerability that allows unauthenticated attackers to compromise Oracle WebLogic Server.
To fix CVE-2024-20931, upgrade your Oracle WebLogic Server to the latest patched version provided by Oracle.
The affected versions of Oracle WebLogic Server include 12.2.1.4.0 and 14.1.1.0.0.
CVE-2024-20931 can be exploited via T3 and IIOP protocols allowing network access without authentication.
Yes, CVE-2024-20931 is easily exploitable, making it critical for affected organizations to apply the necessary patches.