Oracle patches critical flaw in Identity Manager that could allow unauthenticated remote code execution

March 22, 20262 min read2 sources
Share:
Oracle patches critical flaw in Identity Manager that could allow unauthenticated remote code execution

Oracle has released security updates to fix a critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager that could let remote attackers execute arbitrary code without logging in. The flaw, tracked as CVE-2026-21992, carries a CVSS score of 9.8 and is described by Oracle as remotely exploitable without authentication.

According to Oracle’s advisory, successful exploitation could give an attacker significant control over affected systems. Identity Manager is a high-value target because it sits close to account provisioning, access workflows, and connected enterprise services. A compromise in that layer can open the door to credential theft, privilege escalation, and broader lateral movement across corporate environments.

The advisory ties the issue to Oracle Fusion Middleware components, specifically Identity Manager and Web Services Manager. Oracle has not, in the details cited so far, said whether the flaw is being actively exploited in the wild. Even so, the combination of network reachability, no authentication requirement, and code execution makes this the kind of bug defenders typically treat as an immediate patching priority.

For administrators, the short-term response is straightforward: identify exposed Identity Manager and Web Services Manager deployments, apply Oracle’s fixes, and review access to management interfaces. Security teams should also check logs for unusual requests to middleware services, look for unexpected account or configuration changes, and consider restricting access paths through segmentation or a VPN where direct exposure cannot be avoided.

Oracle customers should also watch for follow-up guidance, including affected version details, patch prerequisites, and any indicators of compromise that may emerge from Oracle or third-party researchers. If exploit code appears, internet-facing systems will likely face rapid scanning.

The disclosure is another reminder that identity infrastructure remains one of the most sensitive parts of enterprise networks: when those systems fail, the blast radius is rarely limited to a single server.

Share:

// SOURCES

// RELATED

NIST scales back vulnerability data enrichment after 263% surge in submissions

NIST is limiting detailed analysis in its National Vulnerability Database (NVD) due to a massive increase in submissions, impacting security teams.

2 min readApr 18

Three Microsoft Defender zero-days actively exploited; two still unpatched

Security firm Huntress warns of active exploitation of three Microsoft Defender zero-days, codenamed BlueHammer, RedSun, and UnDefend. Two remain unpa

6 min readApr 18

London healthcare faces months of disruption after ransomware attack on key supplier

A major ransomware attack on pathology provider Synnovis has caused severe, ongoing disruption to London hospitals, highlighting critical supply chain

6 min readApr 18

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17