CVE-2026-21992: Critical Out-of-Band Oracle Identity Manager and Oracle Web Services Manager Remote Code Execution Vulnerability
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经给出了文章的详细内容,我需要先通读一遍,理解主要信息。 文章主要讲的是Oracle发布了针对两个产品的安全警报,涉及CVE-2026-21992这个漏洞,CVSSv3评分9.8,属于严重级别。这个漏洞允许未经认证的远程攻击者执行代码。Oracle罕见地发布了非周期性的安全警报,因为问题非常紧急。 此外,文章还提到之前的一个漏洞CVE-2025-61757已经被利用,并被加入CISA的目录中。这可能促使Oracle这次快速响应。 我需要把这些关键点浓缩到100字以内,确保涵盖漏洞名称、影响产品、评分、攻击方式、安全警报的性质以及之前的漏洞情况。 最后,检查字数是否符合要求,并确保语言简洁明了。 </think> Oracle发布针对Oracle Identity Manager和Web Services Manager的高危漏洞CVE-2026-21992的安全警报,该漏洞CVSSv3评分为9.8,允许未认证远程攻击者执行代码。此次为非定期安全更新,因漏洞风险极高。此前CVE-2025-61757已被野外利用并加入CISA KEV目录。 2026-3-20 07:58:50 Author: www.tenable.com(查看原文) 阅读量:8 收藏


March 20, 2026

4 Min Read


A graphic from Tenable Research Special Operations regarding an out-of-band advisory. It features a yellow hexagon icon with crossed band-aids above the text "Out-of-Band Advisory" and "Oracle Identity and Web Services Manager RCE," all framed by a colorful striped border.

Oracle published an out-of-band security alert for a critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager, following in-the-wild exploitation of a related flaw in the same component in November 2025.

Key takeaways:

  1. CVE-2026-21992 is a critical remote code execution vulnerability in Oracle Identity Manager and Oracle Web Services Manager with a CVSSv3 score of 9.8.
     
  2. The vulnerability is remotely exploitable without authentication, and Oracle issued an out-of-band security alert outside of its regular quarterly Critical Patch Update cycle.
     
  3. A related vulnerability in Oracle Identity Manager's REST WebServices component, CVE-2025-61757, was exploited in the wild and added to CISA's KEV catalog in November 2025.

Background

On March 19, Oracle published an out-of-band security alert for a critical vulnerability in two Oracle Fusion Middleware products:

CVEDescriptionCVSSv3
CVE-2026-21992Oracle Fusion Middleware Remote Code Execution Vulnerability9.8

Oracle rarely issues out-of-band security alerts, reserving them for vulnerabilities that warrant attention outside of its quarterly Critical Patch Update (CPU) cycle. The next scheduled CPU is April 2026.

Analysis

CVE-2026-21992 is a remote code execution vulnerability affecting two Oracle Fusion Middleware products: Oracle Identity Manager and Oracle Web Services Manager. An unauthenticated, remote attacker could exploit this vulnerability over HTTP to achieve code execution on a vulnerable system. The vulnerability has a CVSSv3 score of 9.8.

The vulnerability affects different components in each product. In Oracle Identity Manager, the affected component is REST WebServices. In Oracle Web Services Manager, the affected component is Web Services Security.

Out-of-band advisory signals elevated risk

Oracle describes its Security Alerts as fixes "deemed too critical to wait for distribution in the next Critical Patch Update." Oracle has issued approximately 31 Security Alerts since 2010, averaging about two per year. The decision to release CVE-2026-21992 as an out-of-band Security Alert rather than waiting for the next quarterly CPU in April 2026 is significant.

This is only the second out-of-band Security Alert Oracle has issued for Oracle Identity Manager. The first, CVE-2017-10151, was a CVSS 10.0 default account vulnerability that allowed complete compromise of Identity Manager via an unauthenticated network attack.

The urgency may be related to CVE-2025-61757, a pre-authentication RCE in Oracle Identity Manager patched in Oracle’s October 2025 CPU and added to CISA's Known Exploited Vulnerabilities (KEV) catalog in November 2025.

Researchers at Searchlight Cyber published details describing CVE-2025-61757 as an authentication bypass in Identity Manager's REST WebServices component, calling it "somewhat trivial and easily exploitable by threat actors." While CVE-2026-21992 affects the same product, component and versions, Oracle has not confirmed whether the two are related. Oracle has also not disclosed whether CVE-2026-21992 has been exploited in the wild.

Historical exploitation of Oracle Fusion Middleware vulnerabilities

Oracle Fusion Middleware has six vulnerabilities in CISA's KEV catalog. Oracle has 42 total entries across all products in the catalog.

CVEDescriptionDate Added
CVE-2025-61757Oracle Fusion Middleware Missing Authentication Vulnerability (Identity Manager)2025-11-21
CVE-2021-35587Oracle Fusion Middleware Access Manager Takeover Vulnerability2022-11-28
CVE-2020-2551Oracle Fusion Middleware WebLogic Server Vulnerability2023-11-16
CVE-2012-1710Oracle WebCenter Forms Recognition Vulnerability2022-05-25
CVE-2012-0518Oracle Application Server Single Sign-On Vulnerability2022-03-28
CVE-2012-3152Oracle Fusion Middleware Reports Developer Vulnerability2021-11-03

Proof of concept

At the time this blog post was published, there was no public proof-of-concept (PoC) available for CVE-2026-21992.

Solution

Oracle has released patches for the following affected products:

Affected ProductsCVEAffected Versions
Oracle Identity ManagerCVE-2026-2199212.2.1.4.0, 14.1.2.1.0
Oracle Web Services ManagerCVE-2026-2199212.2.1.4.0, 14.1.2.1.0

Patch details are available through the Patch Availability Document for Fusion Middleware.

Identifying affected systems

A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2026-21992 as they're released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets using the following query: Web Servers equals Oracle WebLogic Server

Tenable ASM Screenshot showing Oracle Weblogic Server filtering

Get more information

Join Tenable's Research Special Operations (RSO) Team on Tenable Connect and engage with us in the Threat Roundtable group for further discussions on the latest cyber threats.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Satnam Narang

Satnam Narang

Senior Staff Research Engineer, Security Response

Satnam joined Tenable in 2018. He has over 15 years experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder. He's appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.

Interests outside of work: Satnam writes poetry and makes hip-hop music. He enjoys live music, spending time with his three nieces, football and basketball, Bollywood movies and music and Grogu (Baby Yoda).

  • Exposure Management
  • Vulnerability Management

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.


文章来源: https://www.tenable.com/blog/cve-2026-21992-critical-out-of-band-oracle-identity-manager-and-oracle-web-services-manager
如有侵权请联系:admin#unsafe.sh