Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy
May 7, 2026
Phishing Attack: Event Invites Steal Your Login Credentials
May 7, 2026
FEMITBOT Network Pushes Crypto Fraud via Telegram Uses Mini
May 7, 2026
Home/CyberSecurity News/Critical WebLogic RCE Vulnerabilities Actively Explo
CyberSecurity News

Critical WebLogic RCE Vulnerabilities Actively Explo

Threat actors are weaponizing new software flaws at an unprecedented pace, a recent cybersecurity study reveals. According to data collected from a high-interaction honeypot, hackers are actively...

Marcus Rodriguez
Marcus Rodriguez
April 1, 2026 2 Min Read
2 0

Threat actors are weaponizing new software flaws at an unprecedented pace, a recent cybersecurity study reveals.

According to data collected from a high-interaction honeypot, hackers are actively exploiting a newly disclosed, maximum-severity vulnerability in Oracle WebLogic Server.

The critical flaw, tracked as CVE-2026-21962, carries a CVSS score of 10.0. It allows unauthenticated attackers to execute arbitrary remote code (RCE) on vulnerable servers via the WebLogic Console.

Security researchers observed attack attempts immediately after the exploit code was published online on January 22, 2026.

This lightning-fast exploitation highlights the extreme risk posed to organizations running unpatched instances.

Honeypot Captures Automated Attacks

To understand the threat landscape, researchers deployed a high-interaction honeypot that mimics a vulnerable Oracle WebLogic Server (version 14.1.1.0.0) for 12 days.

The system quickly captured a massive surge in malicious traffic. Attackers primarily used rented Virtual Private Servers (VPS) from popular hosting providers, such as DigitalOcean and HOSTGLOBAL.PLUS, to launch high-volume, automated scans while hiding their true locations.

Instead of carefully targeted strikes, threat actors used a broad “spray and pray” approach.

Automated tools like libredtail-http (generating over 1,000 requests) and the Nmap Scripting Engine flooded the honeypot with malicious requests.

While the primary goal was compromising the new CVE-2026-21962 flaw via specific ProxyServlet HTTP GET requests, attackers also heavily tested the server for older, unpatched vulnerabilities.

The data confirms that cybercriminals do not just chase new zero-days; they also rely heavily on older, proven exploits.

Adapted for clear readability without complex data structures, the honeypot recorded steady attacks against several historical WebLogic vulnerabilities:

  • CVE-2020-14882 and CVE-2020-14883: Critical RCE flaws (CVSS 9.8) targeting the administrative console by bypassing authentication.
  • CVE-2020-2551: A severe deserialization vulnerability in the IIOP protocol that allows remote attackers to execute arbitrary code.
  • CVE-2017-10271: An older but highly reliable XML deserialization flaw in the WLS-WSAT component, often exploited via crafted SOAP requests.

Interestingly, the automated scanners also identified completely unrelated vulnerabilities, such as bugs in Hikvision cameras and in PHPUnit, proving that attackers constantly cast a wide net, looking for any open door.

Mitigation Steps

The rapid weaponization of CVE-2026-21962 means organizations must act immediately to secure their networks.

According to CloudSEK, cybersecurity experts recommend the following critical defenses.:

  • Apply Patches Immediately: Administrators must install the latest Oracle Critical Patch Updates (CPUs) across all components, prioritizing fixes for CVE-2026-21962.
  • Restrict Console Access: The WebLogic administrative console should never be exposed directly to the public internet. Secure it behind a strict VPN or internal firewall.
  • Deploy a Web Application Firewall (WAF): Configure WAF rules to detect and block malicious path traversal requests, Deep Packet Inspection (DPI) evasion attempts, and known exploit signatures.
  • Monitor System Logs: Watch closely for unusual administrative access attempts or for the sudden execution of suspicious operating system commands such as wget or curl.

Leaving a WebLogic server exposed and unpatched is virtually guaranteed to result in a total system compromise.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitHackerPatchSecurityThreatVulnerabilityzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Vertex AI Vulnerability Exposes Google Cloud Sensitive

Next Post

Magecart Hijacks eStore Checkouts, Stealing Hackers Uses

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Taiwan HSR Hacked: Radio Spoofing Halts High Speed
May 6, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us