CVE-2021-2075

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Oracle WebLogic Server allows unauthenticated attackers to remotely execute arbitrary code and completely compromise affected servers. It affects multiple supported versions of WebLogic Server and can be exploited via IIOP or T3 protocols. Successful exploitation results in full system takeover with confidentiality, integrity, and availability impacts.

💻 Affected Systems

Products:
  • Oracle WebLogic Server
Versions: 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
Operating Systems: All supported platforms running affected WebLogic versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Samples component. Servers with IIOP or T3 protocols enabled are vulnerable. The vulnerability is present in default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WebLogic Server leading to data theft, ransomware deployment, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to cryptocurrency mining, data exfiltration, or botnet enrollment due to the ease of exploitation and high CVSS score.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place, though the vulnerability remains critical.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via network protocols makes internet-facing servers extremely vulnerable to automated attacks.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows lateral movement and privilege escalation within the network without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and has been observed in the wild. The CVSS 9.8 score indicates trivial exploitation with maximum impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Critical Patch Update (CPU) January 2021 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2021.html

Restart Required: Yes

Instructions:

1. Download the appropriate Critical Patch Update from Oracle Support. 2. Apply the patch to affected WebLogic Server installations. 3. Restart WebLogic Server instances. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Disable IIOP and T3 Protocols

all

Block or disable IIOP and T3 protocols to prevent exploitation vectors

Configure WebLogic Server to disable IIOP and T3 protocols in configuration files
Use firewall rules to block ports used by IIOP/T3 (typically 7001-7010)

Network Segmentation

all

Restrict network access to WebLogic Server administration ports

iptables -A INPUT -p tcp --dport 7001:7010 -j DROP (Linux)
netsh advfirewall firewall add rule name="Block WebLogic Ports" dir=in action=block protocol=TCP localport=7001-7010 (Windows)

🧯 If You Can't Patch

  • Immediately isolate affected servers from internet access and restrict internal network access
  • Implement strict network monitoring and intrusion detection for IIOP/T3 traffic anomalies

🔍 How to Verify

Check if Vulnerable:

Check WebLogic Server version and compare with affected versions list. Verify if Samples component is installed.

Check Version:

java weblogic.version (run from WebLogic installation directory)

Verify Fix Applied:

Verify the Critical Patch Update has been applied by checking version information and patch status in WebLogic console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual IIOP or T3 protocol activity
  • Unexpected process creation or Java class loading
  • Authentication bypass attempts in WebLogic logs

Network Indicators:

  • Suspicious traffic on WebLogic IIOP/T3 ports (7001-7010)
  • Unusual outbound connections from WebLogic servers
  • Exploit kit traffic patterns

SIEM Query:

source="weblogic.log" AND ("IIOP" OR "T3") AND ("error" OR "exception" OR "malformed")

🔗 References

📤 Share & Export