- Description
- Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
- Source
- secalert_us@oracle.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-862
- Hype score
- Not currently trending
Remediation for CVE-2024-20767 and CVE-2024-21216 Potential Exploitable Bugs https://t.co/AIqOWUDHt1
@_r_netsec
19 Nov 2024
1431 Impressions
5 Retweets
12 Likes
7 Bookmarks
0 Replies
0 Quotes
کشف آسیبپذیری درOracle یک آسیبپذیری با شناسه CVE-2024-21216 و شدت 9.8 (بحرانی) در Oracle WebLogic Server و مؤلفه Core کشف شده است. دستکاری منجر به احراز هویت نا درست میشود و به مهاجم اجازه میدهد با بهرهبرداری از دو پروتکل IIOP و T3 به سرور Oracle WebLogic نفوذ کند.
@cybernetic_cy
12 Nov 2024
58 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Oracle WebLogic の脆弱性 CVE-2024-21216 (CVSS 9.8) が FIX:直ちにアップデートを! https://t.co/lJ7FMsf2dM #Oracle #Vulnerability #WebLogic
@iototsecnews
30 Oct 2024
68 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: CVE-2024-21216 (CVSS 9.8): Oracle WebLogic Flaw That Could Give Attackers Full C CVE-2024-21215 CVE-2024-21216 CVE-2024-21234 Severity: ⚠️ Critical Maturity: 💢 Emerging Learn more: https://t.co/xxX8f5aXJ4 #CyberSecurity #ThreatIntel #InfoSec
@fletch_ai
22 Oct 2024
80 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Oracle fixes CVE-2024-21216 in Weblogic Server #OracleWebLogic #CVE-2024-21216 https://t.co/grH35KLMy6
@pravin_karthik
21 Oct 2024
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical: CVE-2024-21216 :: CVSS 9.8 Update your Oracle WebLogic Server NOW!! Technical Details: https://t.co/k435cyjbqs #PatchNOW #Oracle #Vulnerability #cybersecurity #ComputerSecurity #hacked #Cyberattack #infosec #informationsecurity #CyberSecurityAwareness #DataBreach http
@patchnow24x7
21 Oct 2024
469 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
2 Quotes
#오라클 웹로직 서버의 치명적 취약점 #CVE-2024-21216 12.2.1.4.0 and 14.1.1.0.0. 버전에 영향을 주는 취약점으로 비인가자가 T3, IIOP를 경유해 네트워크에 접근하고 오라클 웹로직 서버를 탈취할 수 있습니다. #Criminal_IP query ✅"Welcome to Weblogic Application Server“ ✅title: Weblogic… https://t.co/x55Z9ZKUiV https://t.co/lCaqMMGGrH
@CriminalIP_KR
21 Oct 2024
111 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Oracle WebLogicにおける遠隔コード実行の脆弱性CVE-2024-21216について。CVSSスコア9.8。10月のCritical Patch Update (CPU)で修正されたもの。T3またはIIOPのプロトコルが有効(既定で有効)であることが条件。 https://t.co/Jfqs3L16qY
@__kokumoto
21 Oct 2024
1812 Impressions
7 Retweets
23 Likes
3 Bookmarks
1 Reply
0 Quotes
Alert🚨CVE-2024-21216: A critical vulnerability in Oracle WebLogic Server could lead to a full server takeover. https://t.co/MIwnUdZPGd
@freedomhack101
67 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#CVE-2024-21216 Weblogic Remote Code Execution via T3/IIOP https://t.co/Ez8e6TeEgG
@pyn3rd
16853 Impressions
25 Retweets
184 Likes
56 Bookmarks
4 Replies
0 Quotes
#오라클 웹로직 서버의 치명적 취약점 #CVE-2024-21216 12.2.1.4.0 and 14.1.1.0.0. 버전에 영향을 주는 취약점으로 비인가자가 T3, IIOP를 경유해 네트워크에 접근하고 오라클 웹로직 서버를 탈취할 수 있습니다. #Criminal_IP query ✅"Welcome to Weblogic Application Server“ ✅title: Weblogic… https://t.co/euZK5Yz3Va https://t.co/vLVwkFYHVY
@CriminalIP_KR
76 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-21216
@GhgYellow
63 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨CVE-2024-21216: Critical vulnerability in Oracle WebLogic Server could lead to a full server takeover. 📊 18K+ Services are found on https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/Md98R2vQNf 👇Query Hunter: /product.name="WebLogic Server" SHODAN:… https://t.
@HunterMapping
8605 Impressions
51 Retweets
137 Likes
53 Bookmarks
0 Replies
0 Quotes
🚨🚨CVE-2024-21216 (CVSS: 9.8) : Critical Vulnerability in Oracle WebLogic ⚠️Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of…
@zoomeye_team
566 Impressions
1 Retweet
3 Likes
3 Bookmarks
0 Replies
0 Quotes
[CVE-2024-21216: CRITICAL] Critical vulnerability in Oracle WebLogic Server could lead to a full server takeover. Update to versions 12.2.1.4.0 and 14.1.1.0.0 to stay protected from this exploit.#cybersecurity,#vulnerability https://t.co/sa5QJx1Cfs https://t.co/ejICqt7oqu
@CveFindCom
207 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#Oracle ウェブロジックサーバーの致命的な脆弱性 #CVE-2024-21216 12.2.1.1.4.0 と 14.1.1.1.0.0.0.0.のバージョンに影響を与える脆弱性で、非認可者がT3、IIOPを経由し、ネットワークにアクセスしてOracle ウェブロジックサーバーを掌握可能性があります。 #Criminal_IP クエリ ✅"Welcome to… https://t.co/kfsUq4cupg https://t.co/6ymkuCtRzQ
@CriminalIP_JP
118 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨🚨CVE-2024-21216 (CVSS: 9.8) : Critical Vulnerability in Oracle WebLogic ⚠️Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server.
@asdfg12346782
8 Impressions
1 Retweet
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-21216 : Oracle Weblogic Remote Code Execution via T3/IIOP https://t.co/oxlfKTyICj
@freedomhack101
71 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752"
}
],
"operator": "OR"
}
]
}
]