Oracle has issued a critical security advisory about a high-severity vulnerability in WebLogic Server, identified as CVE-2025-21535, with a CVSS score of 9.8. This flaw allows remote, unauthenticated attackers to execute arbitrary code on vulnerable systems by exploiting insufficient input validation in the T3 and IIOP protocols. The affected versions include 12.2.1.4.0 and 14.1.1.0.0, making this a significant threat due to WebLogic Server’s widespread use as a Java EE application server in enterprise environments. Oracle has released patches to address this vulnerability, which are available through its support portal. For organizations unable to apply the patches immediately, Oracle has recommended temporary mitigations: restricting access to the T3 protocol by configuring the WebLogic connection filter to block unauthorized connections and disabling the IIOP protocol via the WebLogic admin console. A server restart is necessary after implementing these changes to ensure the mitigations take effect. WebLogic’s importance in enterprise operations, including its roles in web server management, EJB containers, JMS message queues, and transaction processing, means that exploiting this vulnerability could have severe repercussions. Organizations are strongly advised to promptly apply the patch or implement the suggested mitigations to safeguard their systems.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...