Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
A patched vulnerability found in Oracle’s Fusion Middleware Access Manager (OAM) is currently under active exploitation. CVE-2021-35587 allows attackers with network access via HTTP to take over the Access Manager product. Oracle Fusion Middleware is a cloud platform used by large factories and telecom carriers.
CVE-2021-35587 has a CVSS base score of 9.8 and has been placed on the Cybersecurity and Infrastructure Security Agency’s (CISA) list of known exploited vulnerabilities (KEV). As stated, the vulnerability was patched in January 2022, but if CISA is adding it to the KEV catalog then it means that one or more systems were not updated within the appropriate time frame - enabling attackers to exploit it.
Security researcher Nguyen Jang, who contributed to reporting the bug, stated earlier in the year that the flaw could “give an attacker access to the OAM server, to create any user with any privileges or just get code execution in the victim’s server.” There are no details regarding the nature of the current attacks or the scale of exploitation efforts. However, data from the intelligence firm GreyNoise shows that attempts to exploit CVE-2021-35587 are ongoing and originate from Germany, the U.S., Canada, and Singapore.
CVE-2021-35587 affects the following versions of Oracle Access Manager:
The flaw also affects Oracle WebLogic Server:
At this time, there are no known IoCs associated with CVE-2021-35587. Avertium’s threat hunters remain vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
Oracle Access Manager Pre-Auth RCE (CVE-2021–35587 Analysis) | by Jang | Medium
CISA Warns of Actively Exploited Critical Oracle Fusion Middleware Vulnerability (thehackernews.com)
NVD - CVE-2021-35587 (nist.gov)
Oracle Fusion Middleware Flaw Flagged by CISA (darkreading.com)
Pre-auth RCE in Oracle Fusion Middleware exploited in the wild (CVE-2021-35587) - Help Net Security
Oracle Critical Patch Update Advisory - January 2022