CVE-2022-21441
📋 TL;DR
CVE-2022-21441 is a denial-of-service vulnerability in Oracle WebLogic Server that allows unauthenticated attackers to crash the server via T3/IIOP network protocols. Affected versions include 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0 of Oracle WebLogic Server. This vulnerability impacts availability by causing server hangs or crashes.
💻 Affected Systems
- Oracle WebLogic Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service with WebLogic Server becoming unresponsive, requiring manual restart and causing extended service disruption.
Likely Case
Server crashes or hangs requiring restart, causing temporary service unavailability.
If Mitigated
No impact if T3/IIOP protocols are blocked or if the server is patched.
🎯 Exploit Status
Oracle describes this as 'easily exploitable' with unauthenticated network access via T3/IIOP protocols.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply patches from Oracle Critical Patch Update Advisory - April 2022
Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2022.html
Restart Required: Yes
Instructions:
1. Download appropriate patches from Oracle Support. 2. Apply patches according to Oracle documentation. 3. Restart WebLogic Server instances. 4. Verify patch application.
🔧 Temporary Workarounds
Block T3/IIOP Protocols
linuxRestrict network access to T3 (port 7001) and IIOP (port 7002) protocols using firewalls or network security groups.
iptables -A INPUT -p tcp --dport 7001 -j DROP
iptables -A INPUT -p tcp --dport 7002 -j DROP
Disable T3 Protocol
allConfigure WebLogic Server to disable T3 protocol if not required.
Modify config.xml to set EnableT3Protocol=false
🧯 If You Can't Patch
- Implement network segmentation to restrict access to WebLogic Server T3/IIOP ports
- Deploy Web Application Firewall (WAF) with DoS protection rules
🔍 How to Verify
Check if Vulnerable:
Check WebLogic Server version and compare with affected versions list.
Check Version:
java weblogic.version
Verify Fix Applied:
Verify patch application through Oracle OPatch utility and confirm version is no longer in affected range.
📡 Detection & Monitoring
Log Indicators:
- Multiple connection attempts to T3/IIOP ports followed by server crash/hang
- OutOfMemory errors or thread dump patterns
Network Indicators:
- Unusual traffic patterns to port 7001/7002 from untrusted sources
- Multiple rapid connections to T3/IIOP endpoints
SIEM Query:
source_port=7001 OR source_port=7002 AND (event_type=connection_attempt OR event_type=dos_attack)