Jump to content

Oracle issues emergency patch for critical WebLogic Server flaw


Recommended Posts

Oracle issued an out-of-band security update over the weekend to address a critical remote code execution (RCE) vulnerability impacting multiple Oracle WebLogic Server versions.

The security vulnerability tracked as CVE-2020-14750 received a 9.8 severity base score from Oracle, out of a maximum rating of 10.




Oracle credits 20 organizations and people in the security advisory for having provided information that allowed the company to address CVE-2020-14750.

No-auth RCE

Unauthenticated attackers can remotely exploit this no-auth RCE flaw in the server's console component via HTTP, without user interaction, as part of low complexity attacks to potentially take over targeted servers.


"It is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password," Oracle's advisory explains.


"Due to the severity of this vulnerability and the publication of exploit code on various sites, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible."


Supported Oracle WebLogic Server versions that are affected by CVE-2020-14750 include,,,, and


Eric Maurice, Director of Security Assurance at Oracle, also shared a link to WebLogic Server hardening instructions in a blog post published on Sunday announcing the out-of-band security update.


Earlier today, the Cybersecurity and Infrastructure Security Agency (CISA) also urged users and administrators to apply the security update to block potential attacks.

Oracle released an out-of-band security alert to address a vulnerability—CVE-2020-14750—in Oracle WebLogic Server. Patch ASAP! https://t.co/34wm2YYgnx #Cyber #Cybersecurity #InfoSec

— US-CERT (@USCERT_gov) November 2, 2020

Related to actively targeted CVE-2020-14882

Oracle also says that the vulnerability is related to CVE-2020-14882, another 9.8 out of 10 critical WebLogic Server flaw that was addressed in the October 2020 Critical Patch Update, two weeks ago.


As BleepingComputer reported on Thursday, threat actors started scanning for exposed and vulnerable Oracle WebLogic instances to CVE-2020-14882 exploits one week after it was during this month's Critical Patch Update according to the SANS Technology Institute.


Just as in the case of CVE-2020-14750, vulnerable versions of Oracle WebLogic Server are,,, and


Even though the company did not provide any further details regarding the relation between the two vulnerabilities, this out-of-band security update might be a direct result of the fact that a bypass for the CVE-2020-14882 patch was discovered on Friday.


BleepingComputer reached out to Oracle for more details and to confirm that CVE-2020-14750 was indeed issued to address last week's CVE-2020-14882 bypass, but did not hear back at the time of publication.


Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    No registered users viewing this page.

  • Create New...