Alert - Oracle WebLogic Server Remote Code Execution Vulnerability – CVE-2020-2883

Number: AL20-014
Date: 4 May 2020

DETAILS

On 14 April 2020, Oracle released an update to address a remote code execution vulnerability VulnerabilityA flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations. , tracked as CVE-2020-2883, in the following versions of Oracle WebLogic Server:
- 10.3.6.0.0
- 12.1.3.0.0
- 12.2.1.3.0
- 12.2.1.4.0

Oracle WebLogic is a middleware product that is typically situated between a front-facing application and a back-end database. A flaw exists in the way WebLogic de-serialises requests sent using T3, a proprietary protocol for communication between the WebLogic server and remote Java virtual machines. A remote actor could exploit this vulnerability by sending a specially crafted T3 request to the WebLogic server, resulting in arbitrary code contained within the request being executed in the context of the account running the service.
Proof of concept code leveraging this vulnerability has been published, and Oracle has indicated that exploitation attempts have been observed.

SUGGESTED ACTION

The Cyber Centre recommends that organizations immediately install the latest security updates from Oracle.

REFERENCES

Cyber Centre Advisory (AV20-112):
https://www.cyber.gc.ca/en/alerts/oracle-security-advisory-april-2020-critical-patch-update

Oracle Critical Patch Update Advisory - April 2020:
https://www.oracle.com/security-alerts/cpuapr2020.html

Oracle blog post:
https://blogs.oracle.com/security/apply-april-2020-cpu

NOTE TO READERS

The Canadian Centre for Cyber Security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. (Cyber Centre) operates as part of the Communications Security Establishment.  We are Canada's national authority on cyber security and we lead the government's response to cyber security events. As Canada's national computer security incident response team, the
Cyber Centre works in close collaboration with government departments, critical infrastructure Critical infrastructureProcesses, systems, facilities, technologies, networks, assets, and services essential to the health, safety, security, or economic well-being of Canadians and the effective functioning of government. Critical infrastructure can be stand-alone or interconnected and interdependent within and across provinces, territories, and national borders. Disruptions of critical infrastructure could result in catastrophic loss of life, adverse economic effects, and significant harm to public confidence. , Canadian businesses and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support, and coordinating information
sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.
 

Date modified: