
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-21216 is a critical vulnerability affecting Oracle WebLogic Server versions 12.2.1.4.0 and 14.1.1.0.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via T3 or IIOP protocols to compromise Oracle WebLogic Server. The vulnerability was disclosed in October 2024 as part of Oracle's Critical Patch Update (CPU) and has been assigned a CVSS 3.1 base score of 9.8, indicating its critical severity (Oracle CPU, NVD).
The vulnerability exists in the Core component of Oracle WebLogic Server and can be exploited through the T3 and IIOP protocols, which are typically enabled by default in standard WebLogic installations. The CVSS vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the vulnerability requires no privileges or user interaction to exploit, has low attack complexity, and can be accessed over the network (Security Online).
Successful exploitation of CVE-2024-21216 can result in complete takeover of the Oracle WebLogic Server. The vulnerability affects all three main security aspects with high severity: confidentiality, integrity, and availability. This means attackers can potentially gain unauthorized access to sensitive data, modify system configurations, and disrupt service operations (NVD).
Oracle has released security patches for the affected versions (12.2.1.4.0 and 14.1.1.0.0) as part of the October 2024 Critical Patch Update. Organizations are strongly advised to apply these patches immediately to protect against potential exploitation. For systems that cannot be immediately patched, it is recommended to restrict access to T3 and IIOP protocols, particularly on internet-facing instances (Oracle CPU).
The vulnerability was discovered and reported by multiple security researchers including Markus Wulftange of CODE WHITE GmbH, ruozhi, spoic, Venenof7, WHOAMI, Ye Jie, yemoli, and yulate (Oracle CPU).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”