CVE-2024-20931

7.5 HIGH

📋 TL;DR

This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via T3 or IIOP protocols to access sensitive data. It affects WebLogic Server versions 12.2.1.4.0 and 14.1.1.0.0, potentially exposing all accessible server data to unauthorized parties.

💻 Affected Systems

Products:
  • Oracle WebLogic Server
Versions: 12.2.1.4.0 and 14.1.1.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires T3 or IIOP protocol access; default installations typically enable these protocols.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all sensitive data stored in or accessible through the WebLogic Server, including credentials, application data, and configuration information.

🟠

Likely Case

Unauthorized access to confidential business data, customer information, or internal application data exposed through the WebLogic Server.

🟢

If Mitigated

Limited data exposure if proper network segmentation and access controls prevent unauthorized T3/IIOP access.

🌐 Internet-Facing: HIGH - Unauthenticated network access via common protocols makes internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to T3/IIOP ports.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Oracle describes as 'easily exploitable' with unauthenticated network access via T3/IIOP.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Critical Patch Update January 2024

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2024.html

Restart Required: Yes

Instructions:

1. Download Critical Patch Update from Oracle Support. 2. Apply patch to affected WebLogic Server instances. 3. Restart WebLogic Server services. 4. Verify patch application.

🔧 Temporary Workarounds

Disable T3 Protocol

all

Block or disable T3 protocol access to prevent exploitation via this vector

Configure WebLogic Server to disable T3 protocol or use firewall rules to block T3 ports (typically 7001)

Disable IIOP Protocol

all

Block or disable IIOP protocol access to prevent exploitation via this vector

Configure WebLogic Server to disable IIOP protocol or use firewall rules to block IIOP ports

Network Segmentation

linux

Restrict network access to WebLogic Server T3 and IIOP ports

iptables -A INPUT -p tcp --dport 7001 -j DROP
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="trusted_network" port protocol="tcp" port="7001" accept'

🧯 If You Can't Patch

  • Implement strict network access controls to limit T3/IIOP access to trusted sources only
  • Monitor network traffic to T3/IIOP ports for suspicious activity and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check WebLogic Server version and compare with affected versions (12.2.1.4.0, 14.1.1.0.0)

Check Version:

java weblogic.version

Verify Fix Applied:

Verify patch application through Oracle OPatch utility and confirm version is no longer vulnerable

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to T3/IIOP ports
  • Unusual data access patterns from unexpected sources

Network Indicators:

  • Unusual T3 or IIOP traffic from unauthorized sources
  • Data exfiltration via T3/IIOP protocols

SIEM Query:

source_port=7001 OR protocol="T3" OR protocol="IIOP" AND (src_ip NOT IN trusted_networks)

🔗 References

📤 Share & Export