INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 19m Global vulnerability Information Technology CRITICAL 52m Global malware Financial Services HIGH 1h Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 2h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 19m Global vulnerability Information Technology CRITICAL 52m Global malware Financial Services HIGH 1h Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 2h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 19m Global vulnerability Information Technology CRITICAL 52m Global malware Financial Services HIGH 1h Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 2h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h
Vulnerabilities

CVE-2017-3506

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Oracle WebLogic Server OS Command Injection Vulnerability — Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker
Published: Jun 3, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Oracle WebLogic Server OS Command Injection Vulnerability — Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.

🤖 AI Executive Summary

CVE-2017-3506 is a critical OS command injection vulnerability in Oracle WebLogic Server that allows remote attackers to execute arbitrary operating system commands via specially crafted HTTP requests containing malicious XML documents. With a CVSS score of 9.0 and publicly available exploits, this vulnerability has been actively exploited in the wild and poses an immediate threat to any organization running unpatched WebLogic instances. The vulnerability targets the WLS Security component and requires no authentication, making it trivially exploitable. Organizations in Saudi Arabia running Oracle WebLogic for enterprise applications, e-government portals, or banking middleware are at critical risk.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 8, 2026 09:16
🇸🇦 Saudi Arabia Impact Assessment
Oracle WebLogic Server is extensively deployed across Saudi Arabia's critical infrastructure. Banking institutions regulated by SAMA commonly use WebLogic as middleware for core banking and payment processing systems. Government entities under NCA oversight use WebLogic for e-government portals and citizen services (such as Absher, Tawakkalna backends, and ministry portals). Energy sector organizations including Saudi Aramco and SABIC may use WebLogic for enterprise resource planning and operational technology integration layers. Telecom providers like STC, Mobily, and Zain use WebLogic for billing and customer management systems. Successful exploitation could lead to complete server compromise, data exfiltration of citizen data, disruption of critical services, and lateral movement within enterprise networks. The availability of public exploits and active exploitation campaigns significantly elevates the risk for Saudi organizations.
🏢 Affected Saudi Sectors
Banking Government Energy Telecommunications Healthcare Retail Education
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Oracle WebLogic Server instances in your environment using asset discovery tools
2. Apply Oracle Critical Patch Update (CPU) from April 2017 or later immediately — Oracle patch ID for this CVE is available in Oracle's security advisory
3. If immediate patching is not possible, disable the /wls-wsat/* and /wls-wsat endpoint by restricting access in the WebLogic deployment descriptors or via web server/WAF rules

COMPENSATING CONTROLS:
4. Deploy WAF rules to block HTTP requests containing malicious XML payloads targeting /wls-wsat/CoordinatorPortType endpoints
5. Block external access to WebLogic administration console and WLS-WSAT endpoints at the network perimeter
6. Implement network segmentation to isolate WebLogic servers from critical assets
7. Monitor for suspicious process execution originating from WebLogic server processes (java/weblogic)

DETECTION RULES:
8. Create IDS/IPS signatures for HTTP POST requests to /wls-wsat/ containing XML elements like <java>, <object>, <void>, <string> with OS commands
9. Monitor for unusual child processes spawned by WebLogic Java processes (cmd.exe, /bin/sh, /bin/bash, powershell)
10. Review web server access logs for requests to /wls-wsat/CoordinatorPortType
11. Note: CVE-2017-3506 patch was bypassed by CVE-2017-10271 — ensure both patches are applied
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع خوادم Oracle WebLogic Server في بيئتكم باستخدام أدوات اكتشاف الأصول
2. تطبيق تحديث Oracle الأمني الحرج (CPU) من أبريل 2017 أو أحدث فوراً
3. إذا لم يكن التحديث الفوري ممكناً، قم بتعطيل نقاط النهاية /wls-wsat/* عن طريق تقييد الوصول في إعدادات WebLogic أو عبر قواعد جدار حماية تطبيقات الويب

الضوابط التعويضية:
4. نشر قواعد جدار حماية تطبيقات الويب لحظر طلبات HTTP التي تحتوي على حمولات XML ضارة تستهدف نقاط نهاية /wls-wsat/CoordinatorPortType
5. حظر الوصول الخارجي إلى وحدة تحكم إدارة WebLogic ونقاط نهاية WLS-WSAT على محيط الشبكة
6. تنفيذ تجزئة الشبكة لعزل خوادم WebLogic عن الأصول الحرجة
7. مراقبة تنفيذ العمليات المشبوهة الصادرة من عمليات خادم WebLogic

قواعد الكشف:
8. إنشاء توقيعات IDS/IPS لطلبات HTTP POST إلى /wls-wsat/ التي تحتوي على عناصر XML مثل <java> و<object> و<void> و<string> مع أوامر نظام التشغيل
9. مراقبة العمليات الفرعية غير المعتادة التي تنشأ من عمليات Java الخاصة بـ WebLogic
10. مراجعة سجلات الوصول لخادم الويب للطلبات إلى /wls-wsat/CoordinatorPortType
11. ملاحظة: تم تجاوز تصحيح CVE-2017-3506 بواسطة CVE-2017-10271 — تأكد من تطبيق كلا التصحيحين
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Vulnerability Management) ECC-2:3-2 (Patch Management) ECC-2:2-1 (Network Security) ECC-2:5-1 (Web Application Security) ECC-2:4-1 (Security Monitoring)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.4 (Vulnerability Management) 3.3.7 (Network Security Management) 3.4.1 (Information Security Event Management) 3.3.11 (Web Application Security)
🟡 ISO 27001:2022
A.8.8 (Management of Technical Vulnerabilities) A.8.9 (Configuration Management) A.8.20 (Networks Security) A.8.16 (Monitoring Activities) A.8.28 (Secure Coding)
🟣 PCI DSS v4.0
6.3.3 (Patching Security Vulnerabilities) 6.4 (Public-Facing Web Applications Protection) 11.3 (Penetration Testing) 11.5 (Network Intrusion Detection) 2.2 (System Configuration Standards)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Oracle:WebLogic Server
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.39%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2024-06-24
Published 2024-06-03
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.