CVE-2020-14750
📋 TL;DR
CVE-2020-14750 is a critical remote code execution vulnerability in Oracle WebLogic Server's Administration Console. Unauthenticated attackers can exploit this via HTTP to completely compromise affected WebLogic servers, potentially gaining full control. This affects multiple supported versions of Oracle WebLogic Server across various Oracle Fusion Middleware releases.
💻 Affected Systems
- Oracle WebLogic Server
- Oracle Fusion Middleware
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server takeover allowing attacker to execute arbitrary code, steal sensitive data, deploy malware, and maintain persistent access to the entire system and connected networks.
Likely Case
Remote code execution leading to data theft, credential harvesting, lateral movement within the network, and deployment of ransomware or other malicious payloads.
If Mitigated
Limited impact if proper network segmentation, strict access controls, and monitoring are in place, though the vulnerability still presents significant risk.
🎯 Exploit Status
Public exploit code is available and actively used in attacks. The vulnerability is listed in CISA's Known Exploited Vulnerabilities catalog, confirming active exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply Critical Patch Update (CPU) October 2020 or later
Vendor Advisory: https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
Restart Required: Yes
Instructions:
1. Download and apply the October 2020 Critical Patch Update (CPU) from Oracle Support. 2. Apply patches specifically for WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, or 14.1.1.0.0. 3. Restart all affected WebLogic Server instances. 4. Verify the patch is applied correctly.
🔧 Temporary Workarounds
Restrict Network Access
linuxBlock external access to WebLogic Administration Console ports (typically 7001, 9002)
iptables -A INPUT -p tcp --dport 7001 -j DROP
iptables -A INPUT -p tcp --dport 9002 -j DROP
Disable Console Access
allTemporarily disable the Administration Console if not required
Modify config.xml to set ConsoleEnabled to false
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to WebLogic servers only to trusted IP addresses
- Deploy web application firewall (WAF) rules specifically blocking known exploit patterns for this vulnerability
🔍 How to Verify
Check if Vulnerable:
Check WebLogic version via console or command line. If running affected versions (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0) without October 2020 CPU, system is vulnerable.
Check Version:
java weblogic.version
Verify Fix Applied:
Verify patch installation by checking version details in WebLogic console or running version check command, confirming October 2020 CPU or later is applied.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to /console/console.portal or /console/consolejndi.portal
- Unexpected process creation from WebLogic Java processes
- Authentication bypass attempts in access logs
Network Indicators:
- HTTP POST requests with serialized Java objects to Administration Console endpoints
- Unusual outbound connections from WebLogic servers
SIEM Query:
source="weblogic_access.log" AND (uri="/console/console.portal" OR uri="/console/consolejndi.portal") AND status=200 AND user_agent="*" | stats count by src_ip
🔗 References
- http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
- http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-14750