CVE-2024-21183

7.5 HIGH

📋 TL;DR

This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via T3 or IIOP protocols to access sensitive data. It affects WebLogic Server versions 12.2.1.4.0 and 14.1.1.0.0, potentially exposing critical information to unauthorized parties.

💻 Affected Systems

Products:
  • Oracle WebLogic Server
Versions: 12.2.1.4.0 and 14.1.1.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the Core component and requires T3 or IIOP protocol access, which are commonly enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all accessible data on the WebLogic Server, including sensitive configuration files, application data, and credentials.

🟠

Likely Case

Unauthorized access to confidential data stored or processed by WebLogic applications, potentially leading to data breaches.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external T3/IIOP access to vulnerable servers.

🌐 Internet-Facing: HIGH - Unauthenticated network access via standard protocols makes internet-facing servers extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal servers are still vulnerable to insider threats or compromised internal systems, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is described as 'easily exploitable' and requires no authentication, suggesting straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Critical Patch Update (CPU) for July 2024 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2024.html

Restart Required: Yes

Instructions:

1. Download the appropriate Critical Patch Update from Oracle Support. 2. Apply the patch following Oracle's WebLogic patching procedures. 3. Restart all WebLogic Server instances. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Block T3/IIOP Network Access

all

Restrict network access to T3 (port 7001) and IIOP (port 7002) protocols using firewalls or network security groups.

# Example firewall rule for Linux (iptables)
iptables -A INPUT -p tcp --dport 7001 -j DROP
iptables -A INPUT -p tcp --dport 7002 -j DROP

Disable T3 Protocol

all

Configure WebLogic to disable T3 protocol if not required for your environment.

# In setDomainEnv.sh or setDomainEnv.cmd
export JAVA_OPTIONS="${JAVA_OPTIONS} -Dweblogic.security.allowCryptoJDefaultJCEVerification=true -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.allowCryptoJDefaultPRNG=true -Dweblogic.security.allowCryptoJDefaultJCEVerification=true -Dweblogic.security.allowCryptoJDefaultJCEVerification=true"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WebLogic servers from untrusted networks
  • Deploy web application firewalls (WAF) to monitor and block suspicious T3/IIOP traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check WebLogic version using the admin console or version command, and verify if T3/IIOP ports are accessible from untrusted networks.

Check Version:

java weblogic.version

Verify Fix Applied:

Verify the patch version in WebLogic admin console and test that T3/IIOP access no longer exposes sensitive data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual T3 or IIOP connection attempts from unexpected sources
  • Access to sensitive data files or configuration without proper authentication

Network Indicators:

  • Unusual traffic patterns on ports 7001 (T3) or 7002 (IIOP)
  • Data exfiltration via T3/IIOP protocols

SIEM Query:

source_port=7001 OR source_port=7002 AND (dest_ip IN [WebLogic_servers]) AND (bytes_out > threshold)

🔗 References

📤 Share & Export