Oracle Issues Emergency Patch for Critical Flaw Enabling Remote Code Execution
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要理解文章的内容。文章讲的是Oracle发布了紧急补丁,修复了一个严重的漏洞CVE-2026-21992,影响了两个核心产品:身份管理器和Web服务管理器。这个漏洞CVSS评分很高,达到了9.8,属于最高严重级别。漏洞无需认证就能被利用,攻击者可以通过HTTP触发远程代码执行。 接下来,我需要确定用户的需求是什么。他们可能需要一个简洁的摘要,用于快速了解文章内容。用户可能是一位IT安全人员或者企业管理人员,需要快速获取关键信息来决策或采取行动。 然后,我要考虑如何在100字内涵盖所有关键点:补丁发布、漏洞影响的产品、CVSS评分、无需认证的攻击方式、修复建议以及未被证实的野外利用情况。同时要保持语言简洁明了。 最后,确保总结不使用任何特定的开头词,直接描述内容。这样用户就能迅速抓住重点。 </think> Oracle发布紧急补丁修复CVSS 9.8高危漏洞CVE-2026-21992,影响身份管理器和Web服务管理器特定版本。该漏洞无需认证即可触发远程代码执行,风险极高。建议用户尽快应用补丁以降低风险。 2026-3-24 09:33:55 Author: thecyberexpress.com(查看原文) 阅读量:5 收藏

CVE‑2026‑21992 Oracle Identity Manager

Oracle has released an emergency out‑of‑band patch to address a critical vulnerability, tracked as CVE‑2026‑21992, that affects two core enterprise products: Oracle Identity Manager and Oracle Web Services Manager. The flaw, disclosed on March 19, 2026, carries a CVSS v3.1 base score of 9.8, placing it in the highest severity category and prompting an urgent advisory from the company’s Integrated Cyber Center (ICC).  

The vulnerability is notable because it can be exploited without authentication, meaning an attacker with network access could trigger remote code execution on affected systems over standard HTTP, without valid login credentials. The advisory explicitly warns that successful exploitation “may result in remote code execution”. 

What’s Affected: Products, Versions, and Risk 

The vulnerability affects specific versions of two products within Oracle’s Fusion Middleware suite: 

  • Oracle Identity Manager, versions 12.2.1.4.0 and 14.1.2.1.0
  • Oracle Web Services Manager, versions 12.2.1.4.0 and 14.1.2.1.0

In Identity Manager, the vulnerability resides in the REST WebServices component of the product, while in Web Services Manager it impacts the Web Services Security module. An attacker who successfully exploits this flaw could potentially take full control of systems running these services, manipulating identity governance workflows or altering security policies for other applications and services.  

According to Oracle’s advisory, the flaw’s low attack complexity and lack of authentication requirements increase the likelihood that opportunistic attackers could probe exposed systems and achieve remote code execution. For enterprises, this means that externally accessible instances of Identity Manager or Web Services Manager are particularly at risk until the patch is applied.  

Patch Release and Support Guidance 

Oracle delivered the fix via a Security Alert, an emergency update process used when a vulnerability is too severe to wait for the regular quarterly Critical Patch Update cycle. The company strongly recommends that customers apply the patches or mitigations provided in this alert “as soon as possible” and remain on supported versions of their products.  

report-ad-banner

However, the patches are only available for versions currently under Premier Support or Extended Support. Systems running older or unsupported releases may not receive the update, which Oracle warns could leave those installations vulnerable unless they are upgraded to a supported version.  

Exploitation in the Wild: What’s Known 

To date, Oracle has not confirmed that the vulnerability has been actively exploited in real‑world attacks, and the advisory does not reference any specific incidents of active exploitation. The company declined to comment on this when asked by security outlets, leaving uncertainty for defensive teams about whether the vulnerability is already being targeted by threat actors.

This lack of transparency is notable, especially given in recent history. In November 2025, Oracle released a patch for another critical unauthenticated remote code execution vulnerability in Oracle Identity Manager that was later confirmed by independent researchers to have been exploited as a zero‑day prior to the patch.  

Wider Security Context 

The significance of the advisory is heightened by recent attacks targeting Oracle products. For example, vulnerabilities in Oracle’s E‑Business Suite (EBS) were leveraged in a large‑scale data theft campaign affecting more than 100 organizations, though Oracle has not publicly tied specific CVEs to those incidents.  

Security professionals warn that identity management infrastructure such as Oracle Identity Manager is often a high‑value target because it governs access across an enterprise. A full compromise of such systems could enable credential theft, privilege escalation, lateral movement, and broader network compromise. 


文章来源: https://thecyberexpress.com/oracle-identity-manager-cve-2026-21992-patch/
如有侵权请联系:admin#unsafe.sh