PatchSiren cyber security CVE debrief
CVE-2017-3248 Oracle CVE debrief
CVE-2017-3248 is a critical Oracle WebLogic Server vulnerability in the Core Components subcomponent. Oracle and NVD describe it as easily exploitable by an unauthenticated attacker with network access via T3, with successful exploitation resulting in takeover of the WebLogic Server. The CVSS v3.0 base score is 9.8, reflecting high confidentiality, integrity, and availability impact.
- Vendor
- Oracle
- Product
- CVE-2017-3248
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Organizations running Oracle WebLogic Server, especially the affected supported versions listed by NVD: 10.3.6.0, 12.1.3.0, 12.2.1.0, and 12.2.1.1. Security teams should treat any exposed WebLogic instance as high priority, particularly if it is reachable over T3.
Technical summary
The NVD record identifies the weakness as an unauthenticated network-accessible issue in Oracle WebLogic Server Core Components, reachable via T3. The affected CPEs are Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0, 12.2.1.0.0, and 12.2.1.1.0. NVD assigns CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H and lists the weakness category as NVD-CWE-noinfo.
Defensive priority
Critical. This is a pre-authentication, network-reachable issue with full compromise impact, so remediation should be immediate for any exposed or production WebLogic Server instance.
Recommended defensive actions
- Apply Oracle's January 2017 CPU/security update referenced in the vendor advisory for affected WebLogic Server versions.
- Inventory WebLogic Server deployments to confirm whether any instance matches the affected versions listed by NVD.
- Restrict or filter network access to WebLogic T3 services to only trusted administrative paths where possible.
- Prioritize remediation on internet-facing or externally reachable WebLogic Server systems.
- Review monitoring and logs for unexpected WebLogic access or signs of server compromise around the exposure window.
Evidence notes
This debrief is based on the NVD record for CVE-2017-3248, which was published on 2017-01-27 and later modified on 2026-05-13. The NVD record names Oracle WebLogic Server Core Components as the affected component, lists the vulnerable versions, and provides the CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. NVD also links Oracle's CPU January 2017 advisory as the vendor reference.
Official resources
-
CVE-2017-3248 CVE record
CVE.org
-
CVE-2017-3248 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
-
Source reference
af854a3a-2127-422b-91ae-364da2661108
Publicly disclosed in January 2017; the CVE record was published on 2017-01-27. Timing context should be read from the CVE and NVD publication dates, not the later modification date.