CVE-2020-14750

9.8 CRITICAL

📋 TL;DR

CVE-2020-14750 is a critical remote code execution vulnerability in Oracle WebLogic Server's Administration Console. Unauthenticated attackers can exploit this via HTTP to completely compromise affected WebLogic servers, potentially gaining full control. This affects multiple supported versions of Oracle WebLogic Server across various Oracle Fusion Middleware releases.

💻 Affected Systems

Products:
  • Oracle WebLogic Server
  • Oracle Fusion Middleware
Versions: 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
Operating Systems: All supported platforms running affected WebLogic versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Administration Console component specifically. All default installations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover allowing attacker to execute arbitrary code, steal sensitive data, deploy malware, and maintain persistent access to the entire system and connected networks.

🟠

Likely Case

Remote code execution leading to data theft, credential harvesting, lateral movement within the network, and deployment of ransomware or other malicious payloads.

🟢

If Mitigated

Limited impact if proper network segmentation, strict access controls, and monitoring are in place, though the vulnerability still presents significant risk.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via HTTP makes internet-facing WebLogic servers extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internally, the unauthenticated nature and low complexity make this easily exploitable by any attacker with network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available and actively used in attacks. The vulnerability is listed in CISA's Known Exploited Vulnerabilities catalog, confirming active exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Critical Patch Update (CPU) October 2020 or later

Vendor Advisory: https://www.oracle.com/security-alerts/alert-cve-2020-14750.html

Restart Required: Yes

Instructions:

1. Download and apply the October 2020 Critical Patch Update (CPU) from Oracle Support. 2. Apply patches specifically for WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, or 14.1.1.0.0. 3. Restart all affected WebLogic Server instances. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict Network Access

linux

Block external access to WebLogic Administration Console ports (typically 7001, 9002)

iptables -A INPUT -p tcp --dport 7001 -j DROP
iptables -A INPUT -p tcp --dport 9002 -j DROP

Disable Console Access

all

Temporarily disable the Administration Console if not required

Modify config.xml to set ConsoleEnabled to false

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to WebLogic servers only to trusted IP addresses
  • Deploy web application firewall (WAF) rules specifically blocking known exploit patterns for this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check WebLogic version via console or command line. If running affected versions (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0) without October 2020 CPU, system is vulnerable.

Check Version:

java weblogic.version

Verify Fix Applied:

Verify patch installation by checking version details in WebLogic console or running version check command, confirming October 2020 CPU or later is applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /console/console.portal or /console/consolejndi.portal
  • Unexpected process creation from WebLogic Java processes
  • Authentication bypass attempts in access logs

Network Indicators:

  • HTTP POST requests with serialized Java objects to Administration Console endpoints
  • Unusual outbound connections from WebLogic servers

SIEM Query:

source="weblogic_access.log" AND (uri="/console/console.portal" OR uri="/console/consolejndi.portal") AND status=200 AND user_agent="*" | stats count by src_ip

🔗 References

📤 Share & Export