Home » News » Oracle has released an urgent patch to eliminate critical vulnerabilities in WebLogic Server

Oracle has released an urgent patch to eliminate critical vulnerabilities in WebLogic Server

The company said that an unknown group of cybercriminals in real attacks is already actively exploiting this security problem.

The vulnerability received an identifier CVE-2019-27296, and, according to the CVSS scale, it received 9.8 points out of 10.

“Due to the severity of this vulnerability, Oracle strongly recommends customers to apply updates as soon as possible”, — warn in Oracle.

The breach is described as a deserialization problem in Oracle WebLogic Server Web Services via XMLDecoder, allowing a remote unauthorized attacker to execute arbitrary code on the victim’s server. This results in complete control over the attacked server.

Read also: Attackers actively exploit previously discovered vulnerability in Oracle WebLogic

“The vulnerability of remote code execution can be exploited without having to go through the authentication process. Thus, an attacker can use a security problem without having username or password,” – said in the Oracle notification.

Company also noted connection of this vulnerability with a previously unmentioned problem of deserialization under the identifier CVE-2019-2725. She was also present at Oracle WebLogic Server, but was patched in April of this year.

Source: https://www.oracle.com

[Total: 1    Average: 5/5]
READ  Criminals attacked US oil companies using Adwind Trojan

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

Graboid Spreads Through Docker Containers

Graboid mining worm spreads through Docker containers

Palo Alto Networks experts have discovered the strange crypto-jacking worm Graboid, which spreads through the …

Attackers use Checkm8 jailbreak

Attackers actively use the fresh Checkm8 jailbreak for their own purposes

Cisco Talos experts warned users that attackers are actively using Checkm8 jailbreak. At the end …

Leave a Reply