Oracle Weblogic Server (MOSC)

MOSC Banner

QID 38863 - Cryptographically Weak Key Exchange Size for WebLogic 12.2.1.4

edited Apr 11, 2025 2:43PM in Oracle Weblogic Server (MOSC) 3 commentsAnswered ✓

A new vulnerability has surfaced regarding TLS and Key Exchange agreement (more specifically the key size.)The product “...xyz...” was flagged by having a weak DH (Diffie Hellman) key exchange or ECDH (Elliptic Curve) key exchange or RSA (Rivest – Shamir – Adleman) key exchange.How do we remediate this vulnerability to match the minimum requirements noted as (RSA & DHE=2048; ECDHE= P-256)Note: If your application is still using RSA key exchange, please ask the vendor for a removal or replacement with either ECDHE –P.256 or DHE 2048-bit in Oracle WebLogic 12.2.1.4 version

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center