{"id":12557,"date":"2021-01-22T07:46:25","date_gmt":"2021-01-22T07:46:25","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12557"},"modified":"2026-04-17T18:07:47","modified_gmt":"2026-04-17T18:07:47","slug":"weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/","title":{"rendered":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Vulnerability Description<\/h2>\n\n\n\n<p>On January 20, 2021, NSFOCUS detected that Oracle released the January 2021 Critical Patch Update (CPU), which fixed 329 vulnerabilities of varying risk levels. Seven of these vulnerabilities are severe and assigned CVE-2021-1994, CVE-2021-2047, CVE-2021-2064, CVE-2021-2108, CVE-2021-2075, CVE-2019-17195, and CVE-2020-14756. Unauthenticated attackers could exploit these vulnerabilities to execute code remotely. These vulnerabilities are assigned a CVSS Base Score of 9.8 and are easy to exploit. Users are advised to take measures without delay to protect against the preceding vulnerabilities.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>A WebLogic Server remote code execution vulnerability (CVE-2021-2109) exists in the console of the WebLogic Server, with a CVSS Base Score of 7.2. Authenticated attackers could remotely execute commands or code via JNDI injection attacks. Currently, the proof of concept (PoC) has been made publicly available. Affected users are advised to fix the vulnerability as soon as possible.<\/p>\n\n\n\n<p>NSFOCUS reproduced the vulnerability immediately after CVE-2021-2109 was listed it as a new entry:<\/p>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.oracle.com\/security-alerts\/cpujan2021.html\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"> Scope of Impact<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Affected Versions<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Weblogic Server 10.3.6.0.0<\/li><li>Weblogic Server 12.1.3.0.0<\/li><li>Weblogic Server 12.2.1.3.0<\/li><li>Weblogic Server 12.2.1.4.0<\/li><li>Weblogic Server 14.1.1.0.0<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Check for the Vulnerabilities<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Local Check<\/li><\/ul>\n\n\n\n<p>Run the following commands to view the WebLogic version and installed patches.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$ cd \/Oracle\/Middleware\/wlserver_10.3\/server\/lib $ java -cp weblogic.jar weblogic.version<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The command output below shows that WebLogic has no patch installed and thus is at risk.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"567\" height=\"127\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-2-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12559\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-2-1.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-2-1-300x67.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Detection via the T3 Protocol<\/li><\/ul>\n\n\n\n<p>Nmap provides a scanning script for the WebLogic T3 protocol. For the vulnerabilities assigned CVE-2020-14825 and CVE-2020-14859, it can detect the WebLogic host enabling T3 services. Following is the information about the related command.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>nmap -n -v -Pn &acirc;&euro;&ldquo;sV [host or network segment address] -p7001,7002 &#8211;script=weblogic-t3-info.nse<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>As shown in the red box in the figure below, when the target has the T3 protocol enabled and the WebLogic version is within the affected range, there is a security risk.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"665\" height=\"669\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-3-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12561\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-3-1.jpg 665w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-3-1-298x300.jpg 298w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-3-1-150x150.jpg 150w\" sizes=\"(max-width: 665px) 100vw, 665px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Patch Update<\/li><\/ul>\n\n\n\n<p>Oracle has released patches to fix these vulnerabilities. Affected users should visit the official security advisory link to download related patches as soon as possible and apply them as indicated in the readme file to ensure long-term effective protection.<\/p>\n\n\n\n<p>Note: Official patches of Oracle can be downloaded only by those with a licensed account of the software. Such users can use that account to log in to https:\/\/support.oracle.com to obtain the latest patches.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Workarounds<\/li><\/ul>\n\n\n\n<p>If users cannot install patches for the time being, they can adopt the following temporary measures to protect against the vulnerabilities (CVE-2021-2047, CVE-2021-2064, CVE-2021-2108, CVE-2021-2075, CVE-2020-14756).<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>&nbsp;Restricting Access to the T3 Protocol<\/li><\/ul>\n\n\n\n<p>Users can temporarily block attacks that exploit vulnerabilities via the T3 protocol by controlling access to the protocol. WebLogic Server provides a default connection filter called weblogic.security.net.ConnectionFilterImpl. This filter accepts all inbound connections. It is advisable to configure a rule through this filter to control access to T3 and T3S protocols. To control access to T3 and T3S protocols, follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Access the administration console of WebLogic Server. Click <strong>base_domain<\/strong> in the left pane and then click the <strong>Security<\/strong> and <strong>Filter<\/strong> tabs successively to open the filter configuration page.<\/li><li>Type <strong>weblogic.security.net.ConnectionFilterImpl<\/strong> in the <strong>Connection Filter<\/strong> field and configure connection filter rules as required in the <strong>Connection Filter Rules<\/strong> field. Rule formats are as follows:<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>127.0.0.1 * * allow t3 t3s Local IP * * allow t3 t3s Allowed IP * * allow t3 t3s&Acirc;&nbsp;&Acirc;&nbsp; * * * deny t3 t3s<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Connection filter rules should be provided in the format of &#8220;target localAddress localPort action protocols&#8221;, where <strong>target <\/strong>indicates one or more servers to be filtered.<strong>localAddress<\/strong> specifies the host address of the server. (An asterisk (*) indicates all local IP addresses.)<strong>localPort<\/strong> specifies the port that the server is listening on. (An asterisk (*) indicates all ports available on the server.)<strong>action<\/strong> specifies the action to be taken. (The value must be <strong>allow<\/strong> or <strong>deny<\/strong>.) &iuml;&not;<strong>protocols<\/strong> specifies the protocols to be filtered. (The value must be <strong>http<\/strong>, <strong>https<\/strong>, <strong>t3<\/strong>, <strong>t3s<\/strong>, <strong>giop<\/strong>, <strong>giops<\/strong>, <strong>dcom<\/strong>, and\/or <strong>ftp<\/strong>.) If no protocol is specified, all protocols will be filtered.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Click <strong>Save<\/strong> to make the rules take effect. If rules do not take effect, you are advised to restart the WebLogic service. It should be noted that restarting the WebLogic service will cause the service interruption for a short while, and therefore you need to ask related personnel to evaluate the service impact before this operation. To restart the WebLogic service in the Windows environment, follow these steps:<\/li><li>Navigate to the <strong>bin<\/strong> directory under the domain directory, and run the <strong>stopWebLogic.cmd<\/strong> file to terminate the WebLogic service in the Windows system, and run the <strong>stopWebLogic.sh<\/strong> file in the Linux system.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"327\" height=\"275\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-4-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12563\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-4-1.jpg 327w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-4-1-300x252.jpg 300w\" sizes=\"(max-width: 327px) 100vw, 327px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>After the execution of the termination script is completed, run the <strong>startWebLogic.cmd<\/strong> or <strong>startWebLogic.sh<\/strong> file to start WebLogic to complete the restart of the WebLogic service.<\/li><\/ul>\n\n\n\n<p>If WebLogic cannot be started after the connection filter is configured according to the preceding steps, please refer to &#8220;Appendix A: WebLogic Service Recovery&#8221; to resume business in time.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Disabling the IIOP Protocol<\/li><\/ul>\n\n\n\n<p>Users can block attacks that exploit vulnerabilities via the IIOP protocol by disabling the protocol. To disable the IIOP protocol, follow these steps:<\/p>\n\n\n\n<p>Access the administration console of WebLogic Server, choose <strong>Services &gt; AdminServer &gt; Protocol<\/strong>, deselect <strong>Enable IIOP<\/strong>, and restart the WebLogic Server to make the setting take effect.<\/p>\n\n\n\n<p>Appendix A: WebLogic Service Recovery<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Recovery via the Console<\/strong><\/li><\/ul>\n\n\n\n<p>Before restarting services, access the administration console of WebLogic Server to delete relevant settings by following these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Choose <strong>base_domain &gt; Security &gt; Browser<\/strong>.<\/li><li>Clear the previous settings and click <strong>Save<\/strong>.<\/li><li>Click <strong>View Changes and Restarts<\/strong> to open <strong>Restart Checklist<\/strong>, select <strong>AdminServer<\/strong>, and click <strong>Restart<\/strong>.<\/li><li><strong>Recovery via the Configuration File<\/strong><\/li><\/ol>\n\n\n\n<p>After the connection filter is configured, configuration information is saved in the <strong>\\Oracle\\Middleware\\user_projects\\domains\\base_domain\\config\\config.xml<\/strong> file. Use a text editor to open the file and find the following contents to be deleted:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&lt;connection-filter&gt;weblogic.security.net.ConnectionFilterImpl&lt;\/connection-filter&gt; &lt;connection-filter-rule&gt;* * 7001 deny t3 t3s&lt;\/connection-filter-rule&gt;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"554\" height=\"305\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-5-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12565\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-5-1.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/01\/0122-5-1-300x165.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On January 20, 2021, NSFOCUS detected that Oracle released the January 2021 Critical Patch Update (CPU), which fixed 329 vulnerabilities of varying risk levels. Seven of these vulnerabilities are severe and assigned CVE-2021-1994, CVE-2021-2047, CVE-2021-2064, CVE-2021-2108, CVE-2021-2075, CVE-2019-17195, and CVE-2020-14756. Unauthenticated attackers could exploit these vulnerabilities to execute code remotely. These vulnerabilities are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[742],"class_list":["post-12557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-weblogic"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On January 20, 2021, NSFOCUS detected that Oracle released the January 2021 Critical Patch Update (CPU), which fixed 329\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-22T07:46:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On January 20, 2021, NSFOCUS detected that Oracle released the January 2021 Critical Patch Update (CPU), which fixed 329\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert\",\"datePublished\":\"2021-01-22T07:46:25+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/\"},\"wordCount\":1123,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/oracle-weblogic.jpg\",\"keywords\":[\"WebLogic\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/\",\"name\":\"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/oracle-weblogic.jpg\",\"datePublished\":\"2021-01-22T07:46:25+00:00\",\"dateModified\":\"2026-04-17T18:07:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/oracle-weblogic.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/oracle-weblogic.jpg\",\"width\":544,\"height\":285,\"caption\":\"Oracle WebLogic Server logo.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS","og_description":"Vulnerability Description On January 20, 2021, NSFOCUS detected that Oracle released the January 2021 Critical Patch Update (CPU), which fixed 329","og_url":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2021-01-22T07:46:25+00:00","article_modified_time":"2026-04-17T18:07:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description On January 20, 2021, NSFOCUS detected that Oracle released the January 2021 Critical Patch Update (CPU), which fixed 329","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert","datePublished":"2021-01-22T07:46:25+00:00","dateModified":"2026-04-17T18:07:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/"},"wordCount":1123,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg","keywords":["WebLogic"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/","name":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg","datePublished":"2021-01-22T07:46:25+00:00","dateModified":"2026-04-17T18:07:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/oracle-weblogic.jpg","width":544,"height":285,"caption":"Oracle WebLogic Server logo."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/weblogic-multiple-remote-code-execution-vulnerabilities-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"WebLogic Multiple Remote Code Execution Vulnerabilities Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12557"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10365"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}