Description
The SSL server implementation in BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP1, and 10.0 sometimes selects the null cipher when no other cipher is compatible between the server and client, which might allow remote attackers to intercept communications.
References (6)
Core 6
Core References
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/26539
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36320
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/25472
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1018620
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/3008
Patch vendor-advisory
x_refsource_bea
http://dev2dev.bea.com/pub/advisory/245
Scores
EPSS
0.0110
EPSS Percentile
78.3%
Details
Status
published
Products (6)
bea/weblogic_server
7.0 (8 CPE variants)
bea/weblogic_server
8.1 (7 CPE variants)
bea/weblogic_server
9.0
bea/weblogic_server
9.1
bea/weblogic_server
9.2 (2 CPE variants)
bea/weblogic_server
10.0
Published
Aug 31, 2007
Tracked Since
Feb 18, 2026