⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..

CVE-2020-14750Corporation Weblogic Server vulnerability

29 documents12 sources
Severity
9.8CRITICALNVD
EPSS
94.4%
top 0.01%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedNov 2
KEV addedNov 3
KEV dueMay 3
Latest updateSep 14
CISA Required Action: Apply updates per vendor instructions.

Description

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability im

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDoracle/weblogic_server5 versions+4
CVEListV5oracle_corporation/weblogic_server5 versions+4

Patches

🔴Vulnerability Details

4
GHSA
GHSA-9wpc-chhp-343g: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console)2022-05-24
CVEList
CVE-2020-14750: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console)2020-11-01
VulnCheck
Oracle WebLogic Server Remote Code Execution Vulnerability2020
VulnCheck
Oracle WebLogic Server Remote Code Execution Vulnerability2020

💥Exploits & PoCs

2
Nuclei
Oracle WebLogic Server - Remote Command Execution
Metasploit
Oracle WebLogic Server Administration Console Handle RCE

📋Vendor Advisories

2
CISA
Oracle WebLogic Server Remote Code Execution Vulnerability2021-11-03
CISA
Oracle WebLogic Server Remote Code Execution Vulnerability2021-11-03

🕵️Threat Intelligence

20
Trendmicro
A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities2022-09-14
Trendmicro
A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities2022-09-14
Qualys
Managing CISA Known Exploited Vulnerabilities with Qualys VMDR | Qualys2022-02-23
Trendmicro
Über Schwachstellen zum illegalen Monero-Mining2021-12-03
Trendmicro
Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify2021-12-03
CVE-2020-14750 — CRITICAL severity | cvebase