According to data collected from a high-interaction honeypot, hackers are actively exploiting a newly disclosed, maximum-severity vulnerability in Oracle WebLogic Server.
The critical flaw, tracked as CVE-2026-21962, carries a CVSS score of 10.0. It allows unauthenticated attackers to execute arbitrary remote code (RCE) on vulnerable servers via the WebLogic Console.
Security researchers observed attack attempts immediately after the exploit code was published online on January 22, 2026.
This lightning-fast exploitation highlights the extreme risk posed to organizations running unpatched instances.
To understand the threat landscape, researchers deployed a high-interaction honeypot that mimics a vulnerable Oracle WebLogic Server (version 14.1.1.0.0) for 12 days.
The system quickly captured a massive surge in malicious traffic. Attackers primarily used rented Virtual Private Servers (VPS) from popular hosting providers, such as DigitalOcean and HOSTGLOBAL.PLUS, to launch high-volume, automated scans while hiding their true locations.
Instead of carefully targeted strikes, threat actors used a broad “spray and pray” approach.
Automated tools like libredtail-http (generating over 1,000 requests) and the Nmap Scripting Engine flooded the honeypot with malicious requests.
While the primary goal was compromising the new CVE-2026-21962 flaw via specific ProxyServlet HTTP GET requests, attackers also heavily tested the server for older, unpatched vulnerabilities.
The data confirms that cybercriminals do not just chase new zero-days; they also rely heavily on older, proven exploits.
Adapted for clear readability without complex data structures, the honeypot recorded steady attacks against several historical WebLogic vulnerabilities:
Interestingly, the automated scanners also identified completely unrelated vulnerabilities, such as bugs in Hikvision cameras and in PHPUnit, proving that attackers constantly cast a wide net, looking for any open door.
The rapid weaponization of CVE-2026-21962 means organizations must act immediately to secure their networks.
According to CloudSEK, cybersecurity experts recommend the following critical defenses.:
Leaving a WebLogic server exposed and unpatched is virtually guaranteed to result in a total system compromise.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities in Attacks appeared first on Cyber Security News.
Salesforce has introduced over 30 new features that improve Slackbot from a personal assistant to…
The Information Commissioner’s Office has given approval to companies to use automated hiring processes. There…
Both Oracle and NetSuite have a history of providing solutions for the Hospitality and Restaurant…
Panasonic announced the appointment of Kentaro (Kent) Ikeda as the new Managing Director of Panasonic…
Storyblok has launched FlowMotion. A new CMS automation and orchestration layer designed to help marketers…
A new Netflix documentary series will tell the story of one of the greatest football…
This website uses cookies.