Security researchers have spotted a new zero-day vulnerability impacting the Oracle WebLogic server that is currently being targeted in the wild.
Oracle has been notified of the zero-day, but the software maker just released its quarterly security patches four days before this zero-day's discovery.
Because the company releases security updates every three months, an update to address this issue won't be released for three more months, until July.
In the meantime, over 36,000 publicly accessible WebLogic servers will remain vulnerable to attacks, and server owners will have to deploy workarounds to counteract any possible breaches.
The zero-day was first spotted on Sunday, April 21, by KnownSec 404, the company behind ZoomEye, a search engine for discovering internet-connected devices.
The company says that attackers are targeting Oracle WebLogic servers running the WLS9_ASYNC and WLS-WSAT components. The first component adds support for server asynchronous operations, while the second is the server's security component.
A vulnerability exists in these two that can trigger the deserialization of malicious code that allows a hacker to take over the targeted system.
To prevent attacks, KnownSec 404 is recommending that companies either remove the vulnerable components and restart their WebLogic servers, or put firewall rules in place to prevent requests being made to two URL paths exploited by the attacks ( /_async/* and /wls-wsat/*).
Only scans, no exploitation
Several sources in the cyber-security community have told ZDNet that attackers are only scanning for WebLogic servers and using a benign exploit to test the vulnerability, but they are not attempting to drop malware or run malicious operations on vulnerable hosts just yet.
Activity on this front is bound to change in the upcoming weeks, with hackers moving from scanning and probing vulnerable servers to full-on attacks.
History has proven that WebLogic servers are some of the most sought after servers by hackers today.
For example, a hacker group made over $226,000 worth of Monero in late 2017 by exploiting CVE-2017-10271, another Oracle WebLogic flaw, also impacting the WSL-WSAT component.
Over the past year and a half, Oracle WebLogic servers have been targeted incessantly, especially by criminal groups engaged in crypto-mining operations. CVE-2017-10271, above all, has remained one of their favorite exploits.
This is because Oracle WebLogic servers usually have access to huge amounts of resources, but also because they are extremely popular, making them easy to find and a prime target for any hacker.
In addition, because WebLogic servers are often deployed in enterprise networks or for running intranets or other public-facing enterprise apps, any compromise of a WebLogic server can easily turn into a catastrophic hack, with intruders gaining access to a wealth of business-sensitive information.
Update, April 26: Today, Oracle issued a rare out-of-band security update to address this vulnerability, which was assigned the CVE-2019-2725 identifier. Oracle WebLogix server owners are advised to patch as soon as possible.
More vulnerability reports:
- Mobile app used in Car2go fraud scheme to steal 100 vehicles
- Security flaw lets attackers recover private keys from Qualcomm chips
- Internet Explorer zero-day lets hackers steal files from Windows PCs
- Nokia 9 buggy update lets anyone bypass fingerprint scanner with a pack of gum
- Microsoft loses control over Windows Tiles subdomain
- KRACK attack: Here's how companies are responding CNET
- Top 10 app vulnerabilities: Unpatched plugins and extensions dominate TechRepublic