← Volver a CVEs
CVE-2019-2725
CRITICALCISA KEV9.8
Descripcion
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado4/26/2019
Ultima modificacion10/27/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorOracle
ProductoWebLogic Server
Nombre vulnerabilidadOracle WebLogic Server, Injection
Fecha inclusion KEV2022-01-10
Fecha limite remediacion2022-07-10
Uso en ransomwareKnown
Productos afectados
oracle:agile_plmoracle:communications_converged_application_serveroracle:peoplesoft_enterprise_peopletoolsoracle:storagetek_tape_analytics_sw_tooloracle:tape_library_acslsoracle:tape_virtual_storage_manager_guioracle:vm_virtualboxoracle:weblogic_server
Debilidades (CWE)
CWE-74
Referencias
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(secalert_us@oracle.com)
http://www.securityfocus.com/bid/108074(secalert_us@oracle.com)
https://support.f5.com/csp/article/K90059138(secalert_us@oracle.com)
https://www.exploit-db.com/exploits/46780/(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujan2020.html(secalert_us@oracle.com)
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/108074(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K90059138(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46780/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.