CVE-2021-2064

9.8 CRITICAL

📋 TL;DR

CVE-2021-2064 is a critical vulnerability in Oracle WebLogic Server that allows unauthenticated remote attackers to execute arbitrary code and completely compromise affected servers. This affects WebLogic Server 12.1.3.0.0 when exposed via IIOP or T3 protocols. Organizations running vulnerable WebLogic deployments are at immediate risk of server takeover.

💻 Affected Systems

Products:
  • Oracle WebLogic Server
Versions: 12.1.3.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires IIOP or T3 protocols to be accessible. Some deployments may have these disabled by default, but many enterprise configurations use them.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WebLogic Server leading to data theft, lateral movement, ransomware deployment, and persistent backdoor installation across the network.

🟠

Likely Case

Attackers gain full control of vulnerable WebLogic servers, install cryptocurrency miners or ransomware, and exfiltrate sensitive application data.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated WebLogic instances with minimal data exposure.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via network protocols makes internet-facing instances extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internally accessible servers are vulnerable to compromised internal hosts or insider threats due to unauthenticated exploitation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple exploit tools and scripts are publicly available. The vulnerability is actively exploited in the wild by threat actors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Critical Patch Update January 2021 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2021.html

Restart Required: Yes

Instructions:

1. Download the January 2021 Critical Patch Update from Oracle Support. 2. Apply the patch to WebLogic Server 12.1.3.0.0. 3. Restart all WebLogic Server instances. 4. Verify patch application via version check.

🔧 Temporary Workarounds

Block T3/IIOP Protocols

all

Disable or block access to T3 and IIOP protocols at network perimeter or host firewall

# Linux firewall example
sudo iptables -A INPUT -p tcp --dport 7001 -j DROP
# Windows firewall example
New-NetFirewallRule -DisplayName "Block WebLogic T3" -Direction Inbound -Protocol TCP -LocalPort 7001 -Action Block

Disable T3 Protocol in WebLogic

all

Configure WebLogic to disable T3 protocol entirely

# In setDomainEnv.sh or setDomainEnv.cmd
set JAVA_OPTIONS=%JAVA_OPTIONS% -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.TrustKeyStore=DemoTrust -Dweblogic.security.SSL.enforceConstraints=off -Dweblogic.security.SSL.trustedCAKeyStore=DemoTrust -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.SSL.ignoreHostnameVerification=true

🧯 If You Can't Patch

  • Immediately isolate vulnerable servers from internet and restrict network access to only required internal systems
  • Implement strict network segmentation and monitor all traffic to/from WebLogic servers for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WebLogic version and verify if 12.1.3.0.0 is running with T3/IIOP enabled. Review Oracle advisory for specific vulnerability checks.

Check Version:

# Check WebLogic version
java weblogic.version

Verify Fix Applied:

Verify patch application by checking WebLogic version post-patch and confirming January 2021 CPU is applied. Test that T3/IIOP blocking is effective.

📡 Detection & Monitoring

Log Indicators:

  • Unusual T3 or IIOP connection attempts
  • Unexpected Java process execution
  • WebLogic server restart anomalies
  • Authentication bypass attempts in logs

Network Indicators:

  • Unusual outbound connections from WebLogic servers
  • T3 protocol traffic to unexpected destinations
  • IIOP protocol exploitation patterns

SIEM Query:

source="weblogic.log" AND ("T3" OR "IIOP") AND ("error" OR "exception" OR "unauthorized")

🔗 References

📤 Share & Export