CVE-2017-10271

HIGH
2017-10-19 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 00:16 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 00:16 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 00:16 nvd
Patch available
CVE Published
Oct 19, 2017 - 17:29 nvd
HIGH 7.5

Description

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Analysis

Oracle WebLogic Server allows unauthenticated remote code execution through the WLS Security component's T3 protocol, massively exploited for cryptocurrency mining and botnet recruitment from 2017 onward.

Technical Context

The CWE-306 missing authentication vulnerability in WebLogic's T3 protocol handler allows unauthenticated attackers to send crafted XML payloads containing XMLDecoder deserialization gadgets. The server processes the untrusted XML, leading to arbitrary command execution as the WebLogic service account.

Affected Products

['Oracle WebLogic Server 10.3.6.0.0', 'Oracle WebLogic Server 12.1.3.0.0', 'Oracle WebLogic Server 12.2.1.1.0', 'Oracle WebLogic Server 12.2.1.2.0']

Remediation

Apply Oracle Critical Patch Update. Restrict T3 protocol access via network filtering. Deploy WebLogic's T3 connection filter to limit access to trusted hosts only. Disable XMLDecoder-based deserialization.

Priority Score

212
Low Medium High Critical
KEV: +50
EPSS: +94.4
CVSS: +38
POC: +20

Share

CVE-2017-10271 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy