Oracle Pushes Emergency Fix for Critical Identity Manager RCE Flaw

Oracle drops an out-of-band patch for CVE-2026-21992, a CVSS 9.8 unauthenticated RCE bug in Identity Manager and Web Services Manager. Patch now.
Oracle Just Dropped a 9.8 - Patch Your Identity Manager Now
Oracle pushed an emergency out-of-band security fix this week for CVE-2026-21992, a critical unauthenticated remote code execution flaw hitting two of its enterprise heavyweights: Oracle Identity Manager and Oracle Web Services Manager. This is not a scheduled quarterly patch - Oracle triggered its Security Alert program, which it reserves for vulnerabilities too dangerous to wait on.
The CVSS v3.1 score landed at 9.8. That is not a typo.
What Happened
The vulnerability lives in both products at versions 12.2.1.4.0 and 14.1.2.1.0. Here is why this one is particularly brutal:
- No authentication required - attackers do not need credentials to exploit it
- No user interaction needed - zero clicks, zero social engineering
- Low complexity - the attack is straightforward to execute
- Exploitable over HTTP - any internet-exposed instance is a live target
Oracle describes the flaw as allowing full remote code execution if successfully exploited. Translation: an attacker can run arbitrary commands on your server from anywhere on the internet.
Oracle has not confirmed whether this is being actively exploited in the wild and declined to comment when pressed. Silence on exploitation status after a 9.8 drop is not reassuring.
Who Is at Risk
If your organization runs either of these systems, treat this as a five-alarm fire:
- Oracle Identity Manager
12.2.1.4.0or14.1.2.1.0 - Oracle Web Services Manager
12.2.1.4.0or14.1.2.1.0
Critical caveat: Oracle only delivers patches through this program for versions under Premier or Extended Support. If your environment is running an unsupported version, you are on your own - and you are exposed.
How Developers and Security Teams Can Respond
- Apply the patch immediately - Oracle is using "strongly recommends" language, which in enterprise-speak means do it now
- Audit your exposure - identify any internet-facing Oracle Identity Manager or Web Services Manager endpoints
- Block external HTTP access where the service does not need to be public-facing
- Check your support status - unsupported versions need an emergency upgrade path, not just a patch discussion
- Monitor for exploitation indicators - unusual process spawning, unexpected outbound connections, or privilege escalation patterns on hosts running these services
Unauthenticated RCE on identity management infrastructure is as bad as it sounds. These systems control who gets access to what across your entire enterprise. A compromised identity platform does not just mean one breach - it means every door is potentially open.
Is your app vulnerable to similar attacks? Run an automated scan in 3 minutes with VibeShield.
Free security scan
Is your app vulnerable to similar attacks?
VibeWShield automatically scans for these and 18 other security checks in under 3 minutes.
Scan your app free