News Stay informed about the latest enterprise technology news and product updates.

Attackers seek Oracle WebLogic vulnerability after faulty patch

The combination of a broken Oracle WebLogic vulnerability and available proof-of-concept exploit code has led threat actors to search for any servers that are at risk.

Following a broken patch, researchers noticed a rise in devices scanning servers potentially at risk to an Oracle...

WebLogic vulnerability.

One of the more than 250 issues addressed in the most recent quarterly Oracle Critical Patch Update on April 18 was an Oracle WebLogic vulnerability (CVE-2018-2628). Multiple users on GitHub released proof-of-concept (POC) exploit code against this flaw as early as April 19; soon after, devices were scanning for at-risk servers.

In a tweet, GreyNoise Intelligence noted the increase in devices searching for an at-risk server: "GreyNoise has observed a large spike in devices scanning the Internet for TCP port 7001 beginning last week on 4/16/18. This activity corresponds directly with the disclosure (4/18/2018) and weaponization (4/18/18) of Oracle WebLogic CVE-2018-2628."

Liao Xinxi -- who originally reported the issue to Oracle -- described how the Oracle WebLogic vulnerability worked in a blog post, and security researchers found the patch was broken and could be easily bypassed. David Tampellini, a security researcher and bug hunter based in Italy, combined the work done by Liao with code from GitHub user MrTcsy to weaponize the POC.

Kevin Beaumont, a security architect based in the U.K., said on Twitter that the problem was the original patch did nothing to fix the Oracle WebLogic vulnerability. Instead, Oracle attempted to mitigate the issue by blacklisting commands used in a potential exploit, but Beaumont said the vendor missed a command.

Beaumont said the risks could be minimized by blocking inbound traffic on port 7001 to vulnerable servers. And Beaumont noted the issues extended beyond that, as well.

This is not the only Oracle WebLogic vulnerability putting users at risk recently. In February, businesses were warned to patch a different WebLogic flaw that was being exploited by cryptojackers.

Dig Deeper on Microsoft Patch Tuesday and patch management

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What do you think of Oracle's attempt to patch WebLogic servers?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close