-
Notifications
You must be signed in to change notification settings - Fork 35
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Advisory 20250108001 - Known Exploited Oracle WebLogic and Mitel Vuln…
…erabilities (#1151) * Please review Advisory 20241122002 * Format markdown docs * Update 20241122002 Hyperlink formatting * Advisory 20250108001 * Format markdown docs * Update 20250108001 * Rename 20250108001 --------- Co-authored-by: thiagoai1 <thiagoai1@users.noreply.github.com> Co-authored-by: JadonWill <117053393+JadonWill@users.noreply.github.com>
- Loading branch information
1 parent
3c5c57b
commit 4b40388
Showing
1 changed file
with
32 additions
and
0 deletions.
There are no files selected for viewing
32 changes: 32 additions & 0 deletions
32
...isories/20250108001-Oracle-WebLogic-Mitel-Vulnerabilities-Known-Exploitation.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
# Known Exploited Oracle WebLogic and Mitel Vulnerabilities - 20250108001 | ||
|
||
## Overview | ||
|
||
The WA SOC has been made aware of exploits released for a high vulnerabilities in Oracle WebLogic and Mitel products. | ||
|
||
The Oracle vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. | ||
|
||
The Mitel MiCollab vulnerability could allow an unauthenticated attacker to conduct a path traversal attack due to insufficient input validation. | ||
A successful exploit of this vulnerability could allow an attacker to gain unauthorised access, with potential impacts to the confidentiality, integrity, and availability of the system. | ||
|
||
## What is vulnerable? | ||
|
||
| Product(s) Affected | Version(s) | CVE | CVSS | Severity | | ||
| ---------------------- | --------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- | ------------ | --------------------- | | ||
| Oracle WebLogic Server | Version 10.3.6.0.0 <br> Version \<=12.2.1.4.0 | [CVE-2020-2883](https://www.cve.org/CVERecord?id=CVE-2020-2883) | 9.8 | **Critical** | | ||
| Mitel MiCollab | Version 9.8 SP1 FP2 (9.8.1.201) and earlier | [CVE-2024-41713](https://www.cve.org/CVERecord?id=CVE-2024-41713) <br> [CVE-2024-55550](https://www.cve.org/CVERecord?id=CVE-2024-55550) | 9.8 <br> 2.7 | **Critical** <br> Low | | ||
|
||
## What has been observed? | ||
|
||
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. | ||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- Oracle: <https://www.oracle.com/security-alerts/cpuapr2020.html> | ||
- Mitel: <https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029> | ||
|
||
## Additional References | ||
|
||
- Zero Day Initiative: <https://www.zerodayinitiative.com/advisories/ZDI-20-504/> |