Language:
https://www.oracle.com/a/tech/docs/cpuoct2020cvrf.xml
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html
Severity: Critical
ID: 141807
File Name: oracle_weblogic_server_cpu_oct_2020.nasl
Version: 1.18
Type: local
Agent: windows, macosx, unix
Family: Misc.
Published: 10/22/2020
Updated: 5/24/2022
Configuration: Enable thorough checks
Supported Sensors: Nessus Agent
Risk Factor: Critical
Score: 9.2
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
CVSS Score Source: CVE-2020-14882
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: E:H/RL:O/RC:C
CPE: cpe:/a:oracle:fusion_middleware, cpe:/a:oracle:weblogic_server
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/20/2020
Vulnerability Publication Date: 10/20/2020
CISA Known Exploited Dates: 5/3/2022
Metasploit (Oracle WebLogic Server Administration Console Handle RCE)
CVE: CVE-2019-17267, CVE-2020-9488, CVE-2020-11022, CVE-2020-14750, CVE-2020-14757, CVE-2020-14820, CVE-2020-14825, CVE-2020-14841, CVE-2020-14859, CVE-2020-14882, CVE-2020-14883
IAVA: 2020-A-0478
CISA-NCAS: AA22-011A