According to data collected from a high-interaction honeypot, hackers are actively exploiting a newly disclosed, maximum-severity vulnerability in Oracle WebLogic Server.
The critical flaw, tracked as CVE-2026-21962, carries a CVSS score of 10.0. It allows unauthenticated attackers to execute arbitrary remote code (RCE) on vulnerable servers via the WebLogic Console.
Security researchers observed attack attempts immediately after the exploit code was published online on January 22, 2026.
This lightning-fast exploitation highlights the extreme risk posed to organizations running unpatched instances.
To understand the threat landscape, researchers deployed a high-interaction honeypot that mimics a vulnerable Oracle WebLogic Server (version 14.1.1.0.0) for 12 days.
The system quickly captured a massive surge in malicious traffic. Attackers primarily used rented Virtual Private Servers (VPS) from popular hosting providers, such as DigitalOcean and HOSTGLOBAL.PLUS, to launch high-volume, automated scans while hiding their true locations.
Instead of carefully targeted strikes, threat actors used a broad “spray and pray” approach.
Automated tools like libredtail-http (generating over 1,000 requests) and the Nmap Scripting Engine flooded the honeypot with malicious requests.
While the primary goal was compromising the new CVE-2026-21962 flaw via specific ProxyServlet HTTP GET requests, attackers also heavily tested the server for older, unpatched vulnerabilities.
The data confirms that cybercriminals do not just chase new zero-days; they also rely heavily on older, proven exploits.
Adapted for clear readability without complex data structures, the honeypot recorded steady attacks against several historical WebLogic vulnerabilities:
Interestingly, the automated scanners also identified completely unrelated vulnerabilities, such as bugs in Hikvision cameras and in PHPUnit, proving that attackers constantly cast a wide net, looking for any open door.
The rapid weaponization of CVE-2026-21962 means organizations must act immediately to secure their networks.
According to CloudSEK, cybersecurity experts recommend the following critical defenses.:
Leaving a WebLogic server exposed and unpatched is virtually guaranteed to result in a total system compromise.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities in Attacks appeared first on Cyber Security News.
DETROIT — An urgent investigation is underway in Detroit after multiple students were hospitalized this…
LANSING, Mich. — A major budget standoff is now underway in Michigan after state Senate…
STARKE COUNTY, IND. (WOWO) A former employee of the Starke County Sheriff’s Department has pleaded…
The status of New Hampshire’s end to mandatory car inspections might still be murky in…
Five major dairy farms populated the half-mile stretch of Upper City Road in Pittsfield where…
Resident Evil Requiem players were sad to see the Merchant left out of Leon's latest…
This website uses cookies.