{"id":11311,"date":"2018-05-22T10:16:34","date_gmt":"2018-05-22T14:16:34","guid":{"rendered":"https:\/\/pitss.org\/us\/?p=11311"},"modified":"2018-07-26T10:36:41","modified_gmt":"2018-07-26T14:36:41","slug":"preventing-oracle-weblogic-server-vulnerability","status":"publish","type":"post","link":"https:\/\/pitss.org\/us\/2018\/05\/22\/preventing-oracle-weblogic-server-vulnerability\/","title":{"rendered":"Preventing Oracle WebLogic Server Vulnerability"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.2.2&#8243; custom_padding=&#8221;0px||0px||true&#8221;][et_pb_row custom_padding=&#8221;0px|||&#8221; _builder_version=&#8221;3.2.2&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.2.2&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][et_pb_text _builder_version=&#8221;3.2.2&#8243;]<\/p>\n<h1>How to Prevent Oracle WebLogic Server Vulnerability<\/h1>\n<p>[\/et_pb_text][et_pb_team_member name=&#8221;by Stephen la Rocca&#8221; position=&#8221;Business Development, PITSS GmbH&#8221; image_url=&#8221;https:\/\/pitss.org\/de\/wp-content\/uploads\/sites\/9\/2017\/10\/stephan_2.jpg&#8221; _builder_version=&#8221;3.2.2&#8243; header_font=&#8221;||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#333333&#8243; header_font_size=&#8221;22px&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#888888&#8243; background_color=&#8221;#e7e6e6&#8243; border_radii=&#8221;on|5px|5px|5px|5px&#8221; border_radii_image=&#8221;on|100%|100%|100%|100%&#8221; custom_margin=&#8221;||30px|&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; custom_css_member_image=&#8221;width: 100px; margin-right: 20px; &#8221; custom_css_title=&#8221;margin-top: 18px; &#8221; custom_css_member_position=&#8221;padding: 0;&#8221; custom_css_member_social_links=&#8221;display: none;&#8221;]<br \/>\n[\/et_pb_team_member][et_pb_text _builder_version=&#8221;3.2.2&#8243; custom_margin=&#8221;40px||40px||true&#8221;]<\/p>\n<p>The US <a href=\"https:\/\/greynoise.io\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>IT security company Greynoise<\/strong><\/a> is currently reporting heavily increased scanning activity for vulnerable WebLogic servers.<\/p>\n<p>Although there are already updates available for these which apparently can already be bypassed by the attackers, the updates do not solve the crux of the problem. Particularly critical seems to be the vulnerability with the identifier CVE-2018-2628.<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;3.2.2&#8243;]&lt;blockquote class=&#8221;twitter-tweet&#8221; data-lang=&#8221;en&#8221;&gt;&lt;p lang=&#8221;en&#8221; dir=&#8221;ltr&#8221;&gt;GreyNoise has observed a large spike in devices scanning the Internet for TCP port 7001 beginning last week on 4\/16\/18. This activity corresponds directly with the disclosure (4\/18\/2018) and weaponization (4\/18\/18) of Oracle WebLogic CVE-2018-2628. Ref: &lt;a href=&#8221;https:\/\/t.co\/3qdeQSF59T&#8221;&gt;https:\/\/t.co\/3qdeQSF59T&lt;\/a&gt;&lt;\/p&gt;\u2014 GreyNoise Intelligence (@GreyNoiseIO) &lt;a href=&#8221;https:\/\/twitter.com\/GreyNoiseIO\/status\/988685136035307520?ref_src=twsrc%5Etfw&#8221;&gt;April 24, 2018&lt;\/a&gt;&lt;\/blockquote&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;script async src=&#8221;https:\/\/platform.twitter.com\/widgets.js&#8221; charset=&#8221;utf-8&#8243;&gt;&lt;\/script&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;style type=&#8221;text\/css&#8221;&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;.entry-content .twitter-tweet-rendered {&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt; max-width: 100% !important;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;}&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;\/style&gt;[\/et_pb_code][et_pb_text _builder_version=&#8221;3.2.2&#8243; custom_margin=&#8221;40px||40px||true&#8221;]<\/p>\n<h3><strong>Close the vulnerability and block TCP port 7001<\/strong><\/h3>\n<p>If you use Oracle WebLogic Server, you should definitely take action. On one hand, the latest version must be installed as soon as possible. That alone does not seem to be enough.<\/p>\n<p>Security researcher <strong><a href=\"https:\/\/twitter.com\/GossiTheDog\" target=\"_blank\" rel=\"noopener noreferrer\">Kevin Beaumant<\/a><\/strong> warns that the most recent patch did not close the actual vulnerability, but merely blacklisted certain commands. Therefore, it is important to additionally block TCP port 7001 in order to avoid external access.<\/p>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;3.2.2&#8243;]&lt;blockquote class=&#8221;twitter-tweet&#8221; data-lang=&#8221;en&#8221;&gt;&lt;p lang=&#8221;en&#8221; dir=&#8221;ltr&#8221;&gt;Oh dear. There\u2019s a zero day in Oracle WebLogic because the April patch didn\u2019t fix the issue properly. Mitigation: make sure port 7001 TCP is blocked inbound to your Fusion stack boxes. &lt;a href=&#8221;https:\/\/t.co\/EqjqMwzXNp&#8221;&gt;https:\/\/t.co\/EqjqMwzXNp&lt;\/a&gt;&lt;\/p&gt;\u2014 Kevin Beaumont (@GossiTheDog) &lt;a href=&#8221;https:\/\/twitter.com\/GossiTheDog\/status\/990621460476649472?ref_src=twsrc%5Etfw&#8221;&gt;April 29, 2018&lt;\/a&gt;&lt;\/blockquote&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;script async src=&#8221;https:\/\/platform.twitter.com\/widgets.js&#8221; charset=&#8221;utf-8&#8243;&gt;&lt;\/script&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;style type=&#8221;text\/css&#8221;&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;.entry-content .twitter-tweet-rendered {&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt; max-width: 100% !important;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;}&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;\/style&gt;[\/et_pb_code][et_pb_divider color=&#8221;#e7e6e6&#8243; divider_position=&#8221;center&#8221; divider_weight=&#8221;0px&#8221; height=&#8221;5px&#8221; _builder_version=&#8221;3.2.2&#8243; custom_margin=&#8221;50px||50px||true&#8221; custom_css_main_element=&#8221;border-radius: 10px; background: #e7e6e6;&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;3.2.2&#8243;]<\/p>\n<p>If you\u2019re looking for help updating, modernizing, and securing your vulnerable WebLogic server, contact PITSS today.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Prevent Oracle WebLogic Server Vulnerability The US IT security company Greynoise is currently reporting heavily increased scanning activity for vulnerable WebLogic servers. Although there are already updates available for these which apparently can already be bypassed by the attackers, the updates do not solve the crux of the problem. Particularly critical seems to [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[71],"tags":[],"class_list":["post-11311","post","type-post","status-publish","format-standard","hentry","category-weblogic-software"],"_links":{"self":[{"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/posts\/11311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/comments?post=11311"}],"version-history":[{"count":9,"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/posts\/11311\/revisions"}],"predecessor-version":[{"id":11790,"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/posts\/11311\/revisions\/11790"}],"wp:attachment":[{"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/media?parent=11311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/categories?post=11311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pitss.org\/us\/wp-json\/wp\/v2\/tags?post=11311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}