Vulnerabilities

CISA Warns of Attacks Exploiting Oracle WebLogic Vulnerability Patched in January

CISA warns of attacks exploiting an Oracle WebLogic vulnerability tracked as CVE-2023-21839, which was patched with the January 2023 CPU.

CISA warns of attacks exploiting an Oracle WebLogic vulnerability tracked as CVE-2023-21839, which was patched with the January 2023 CPU.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added three vulnerabilities to its known exploited vulnerabilities catalog, including an Oracle WebLogic flaw patched by the vendor in January.

There do not appear to be any public reports describing exploitation of the WebLogic vulnerability. The security hole, tracked as CVE-2023-21839, can be exploited for remote code execution, allowing an attacker to take complete control of the targeted server. It was fixed by Oracle with its January 2023 critical patch update (CPU)

Oracle has credited several researchers for informing it about the vulnerability, which is described by the company as being remotely exploitable without authentication and without user interaction.

Several proof-of-concept (PoC) exploits targeting CVE-2023-21839 have been made public since late February and an expert warned in early March that vulnerable systems could be identified using the Shodan search engine. 

Another vulnerability added by CISA to its catalog on Monday is CVE-2023-1389, a remote code execution flaw affecting TP-Link Archer AX-21 routers. 

The vulnerability was initially disclosed at Zero Day Initiative’s Pwn2Own Toronto hacking contest last year, where participants earned nearly $1 million for their exploits.

Zero Day Initiative threat hunters noticed recently that the Mirai botnet had added an exploit for CVE-2023-1389 to its arsenal. In the initially observed attacks, the botnet used the exploit to mainly target devices in Eastern Europe.  

After news of in-the-wild exploitation broke, TP-Link issued a statement urging customers to install the available firmware patches. 

Advertisement. Scroll to continue reading.

The third security hole added by CISA to its catalog is CVE-2021-45046, an Apache Log4j vulnerability that can be exploited for arbitrary code execution. Its existence came to light in 2021, at around the same time as the notorious Log4Shell vulnerability.

CISA and other government cybersecurity agencies warned about CVE-2021-45046 being exploited in attacks back in December 2021. It’s unclear why it has only been added now to the known exploited vulnerabilities catalog. 

Related: Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication

Related: CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog

Related: Veritas Vulnerabilities Exploited in Ransomware Attacks Added to CISA ‘Must Patch’ List

Related Content

Incident Response

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

Vulnerabilities

CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild.

Vulnerabilities

CrushFTP patches a zero-day vulnerability allowing unauthenticated attackers to escape the VFS and retrieve system files.

Malware & Threats

Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.

Malware & Threats

Microsoft warns that several OpenMetadata vulnerabilities are being exploited to deploy cryptomining malware to Kubernetes environments.

Vulnerabilities

Oracle releases 441 new security patches to address 230 vulnerabilities as part of its April 2024 Critical Patch Update.

Malware & Threats

Palo Alto Networks firewall vulnerability CVE-2024-3400 increasingly exploited after PoC code has been released. 

Malware & Threats

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version