CVE-2021-2344
📋 TL;DR
This vulnerability in Oracle Coherence allows unauthenticated attackers with network access via T3 or IIOP protocols to cause denial of service by crashing or hanging the service. It affects multiple versions of Oracle Coherence across Oracle Fusion Middleware. The vulnerability has high availability impact with a CVSS score of 7.5.
💻 Affected Systems
- Oracle Coherence
- Oracle Fusion Middleware
📦 What is this software?
Coherence by Oracle
Coherence by Oracle
Coherence by Oracle
Coherence by Oracle
Coherence by Oracle
⚠️ Risk & Real-World Impact
Worst Case
Complete service outage of Oracle Coherence, disrupting dependent applications and business processes.
Likely Case
Service disruption causing application downtime and performance degradation.
If Mitigated
Limited impact if network access controls prevent T3/IIOP exposure to untrusted networks.
🎯 Exploit Status
Oracle describes as 'easily exploitable' with network access via T3/IIOP protocols.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply Critical Patch Update July 2021 or later
Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2021.html
Restart Required: Yes
Instructions:
1. Download Critical Patch Update July 2021 from Oracle Support. 2. Apply patch to affected Oracle Coherence installations. 3. Restart Oracle Coherence services.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict network access to T3 (port 7001) and IIOP (port 7002) ports to trusted sources only.
iptables -A INPUT -p tcp --dport 7001 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 7002 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 7001 -j DROP
iptables -A INPUT -p tcp --dport 7002 -j DROP
Protocol Disablement
allDisable T3 and IIOP protocols if not required for functionality.
Edit coherence configuration to disable T3 and IIOP protocols
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Oracle Coherence from untrusted networks.
- Deploy web application firewall or intrusion prevention system to monitor and block suspicious T3/IIOP traffic.
🔍 How to Verify
Check if Vulnerable:
Check Oracle Coherence version against affected versions list. Verify if T3/IIOP ports are exposed.
Check Version:
java -jar coherence.jar -version
Verify Fix Applied:
Confirm patch application via Oracle OPatch utility and verify version is no longer in affected range.
📡 Detection & Monitoring
Log Indicators:
- Unexpected service crashes or hangs
- High volume of T3/IIOP connection attempts
- Out of memory errors in Coherence logs
Network Indicators:
- Unusual traffic patterns on T3 (7001) or IIOP (7002) ports
- Connection attempts from unexpected sources
SIEM Query:
source="coherence.log" AND ("crash" OR "hang" OR "out of memory") OR destination_port IN (7001, 7002) AND protocol="T3/IIOP"