vulnerability
Oracle WebLogic: CVE-2021-44832 : Critical Patch Update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:S/C:C/I:C/A:C) | Jan 18, 2022 | Feb 28, 2022 | Apr 22, 2026 |
Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Jan 18, 2022
Added
Feb 28, 2022
Modified
Apr 22, 2026
Description
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
Solutions
oracle-weblogic-jan-2022-cpu-12_2_1_3_0oracle-weblogic-jan-2022-cpu-12_2_1_4_0oracle-weblogic-jan-2022-cpu-14_1_1_0_0
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.