← Back to CVEs
CVE-2019-2725
CRITICALCISA KEV9.8
Description
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/26/2019
Last Modified10/27/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorOracle
ProductWebLogic Server
Vulnerability NameOracle WebLogic Server, Injection
KEV Date Added2022-01-10
Remediation Due Date2022-07-10
Ransomware UseKnown
Affected Products
oracle:agile_plmoracle:communications_converged_application_serveroracle:peoplesoft_enterprise_peopletoolsoracle:storagetek_tape_analytics_sw_tooloracle:tape_library_acslsoracle:tape_virtual_storage_manager_guioracle:vm_virtualboxoracle:weblogic_server
Weaknesses (CWE)
CWE-74
References
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(secalert_us@oracle.com)
http://www.securityfocus.com/bid/108074(secalert_us@oracle.com)
https://support.f5.com/csp/article/K90059138(secalert_us@oracle.com)
https://www.exploit-db.com/exploits/46780/(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujan2020.html(secalert_us@oracle.com)
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/108074(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K90059138(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46780/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.