CVE-2024-21234

7.5 HIGH

📋 TL;DR

This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via T3 or IIOP protocols to access sensitive data. It affects WebLogic Server versions 12.2.1.4.0 and 14.1.1.0.0, potentially exposing confidential information stored on the server.

💻 Affected Systems

Products:
  • Oracle WebLogic Server
Versions: 12.2.1.4.0 and 14.1.1.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires T3 or IIOP protocol access, which are enabled by default in WebLogic Server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all accessible data on the WebLogic Server, including sensitive application data, configuration files, and credentials.

🟠

Likely Case

Unauthorized access to confidential application data, potentially including customer information, business data, or system credentials.

🟢

If Mitigated

Limited or no data exposure if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated network access via standard protocols makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Oracle describes this as 'easily exploitable' and requires no authentication, suggesting straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update October 2024

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2024.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Oracle Support. 2. Stop WebLogic Server instances. 3. Apply the patch according to Oracle documentation. 4. Restart WebLogic Server instances. 5. Verify successful patch application.

🔧 Temporary Workarounds

Block T3/IIOP Protocols

all

Restrict network access to T3 and IIOP protocols using firewalls or network security groups

# Example firewall rule to block T3 (port 7001) and IIOP (port 5556)
iptables -A INPUT -p tcp --dport 7001 -j DROP
iptables -A INPUT -p tcp --dport 5556 -j DROP

Disable T3 Protocol

all

Configure WebLogic Server to disable T3 protocol if not required

# In setDomainEnv.sh or setDomainEnv.cmd
export JAVA_OPTIONS="${JAVA_OPTIONS} -Dweblogic.security.allowCryptoJDefaultJCEVerification=true -Dweblogic.security.SSL.ignoreHostnameVerification=true -Dweblogic.security.allowCryptoJDefaultPRNG=true -Dweblogic.security.allowCryptoJDefaultJCEVerification=true -Dweblogic.security.allowCryptoJDefaultJCEVerification=true -Dweblogic.security.allowCryptoJDefaultJCEVerification=true"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WebLogic servers from untrusted networks
  • Deploy web application firewall (WAF) rules to detect and block suspicious T3/IIOP traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check WebLogic Server version using the WebLogic console or by examining the server logs for version information

Check Version:

java weblogic.version

Verify Fix Applied:

Verify patch application by checking the version in WebLogic console and confirming October 2024 CPU patches are applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual T3 or IIOP connection attempts from unexpected sources
  • Access patterns indicating data extraction
  • Authentication bypass attempts in security logs

Network Indicators:

  • Unusual volume of T3/IIOP traffic
  • T3/IIOP connections from unauthorized IP addresses
  • Data exfiltration patterns over T3/IIOP protocols

SIEM Query:

source="weblogic" AND ("T3" OR "IIOP") AND ("unauthorized" OR "access denied" OR "authentication failure")

🔗 References

📤 Share & Export