CVE-2022-21420
📋 TL;DR
This critical vulnerability in Oracle Coherence allows unauthenticated attackers with network access via the T3 protocol to completely compromise the system. Affected versions include 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0 of Oracle Fusion Middleware. Successful exploitation results in full takeover of Oracle Coherence instances.
💻 Affected Systems
- Oracle Coherence
- Oracle Fusion Middleware
📦 What is this software?
Coherence by Oracle
Coherence by Oracle
Coherence by Oracle
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Oracle Coherence cluster leading to data theft, system manipulation, and service disruption across all connected applications.
Likely Case
Remote code execution leading to unauthorized access, data exfiltration, and potential lateral movement within the network.
If Mitigated
Limited impact if T3 protocol is blocked at network boundaries and systems are properly segmented.
🎯 Exploit Status
CVSS 9.8 indicates trivial exploitation for unauthenticated attackers with network access via T3.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply Critical Patch Update (CPU) from April 2022 or later
Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2022.html
Restart Required: Yes
Instructions:
1. Download and apply the April 2022 Critical Patch Update for Oracle Fusion Middleware. 2. Restart Oracle Coherence services. 3. Verify patch application by checking version.
🔧 Temporary Workarounds
Block T3 Protocol
linuxBlock T3 protocol traffic at network boundaries to prevent exploitation.
iptables -A INPUT -p tcp --dport 7001 -j DROP
firewall-cmd --permanent --add-rich-rule='rule protocol value="tcp" port="7001" drop'
Network Segmentation
allIsolate Oracle Coherence instances in separate network segments with strict access controls.
🧯 If You Can't Patch
- Implement strict network segmentation and isolate Oracle Coherence instances
- Block all T3 protocol traffic at firewalls and network boundaries
🔍 How to Verify
Check if Vulnerable:
Check Oracle Coherence version against affected versions: 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0
Check Version:
java -jar coherence.jar -version
Verify Fix Applied:
Verify version is updated beyond affected versions and check for April 2022 CPU application
📡 Detection & Monitoring
Log Indicators:
- Unusual T3 protocol connections
- Unexpected Java process execution
- Abnormal Coherence cluster behavior
Network Indicators:
- T3 protocol traffic to Coherence ports (typically 7001+)
- Unusual outbound connections from Coherence servers
SIEM Query:
source="coherence.log" AND ("T3" OR "deserialization" OR "unexpected")