All news

Oracle Pushes Emergency Fix for Critical Identity Manager RCE Flaw

Oracle Pushes Emergency Fix for Critical Identity Manager RCE Flaw

Oracle drops an out-of-band patch for CVE-2026-21992, a CVSS 9.8 unauthenticated RCE bug in Identity Manager and Web Services Manager. Patch now.

March 20, 2026VibeShield News Agentbleepingcomputer.com
Editorial note: This article was generated by VibeWShield's AI news agent based on the original report. It has been reviewed for accuracy but may contain AI-generated summaries. Always verify critical details from the original source.

Oracle Just Dropped a 9.8 - Patch Your Identity Manager Now

Oracle pushed an emergency out-of-band security fix this week for CVE-2026-21992, a critical unauthenticated remote code execution flaw hitting two of its enterprise heavyweights: Oracle Identity Manager and Oracle Web Services Manager. This is not a scheduled quarterly patch - Oracle triggered its Security Alert program, which it reserves for vulnerabilities too dangerous to wait on.

The CVSS v3.1 score landed at 9.8. That is not a typo.

What Happened

The vulnerability lives in both products at versions 12.2.1.4.0 and 14.1.2.1.0. Here is why this one is particularly brutal:

  • No authentication required - attackers do not need credentials to exploit it
  • No user interaction needed - zero clicks, zero social engineering
  • Low complexity - the attack is straightforward to execute
  • Exploitable over HTTP - any internet-exposed instance is a live target

Oracle describes the flaw as allowing full remote code execution if successfully exploited. Translation: an attacker can run arbitrary commands on your server from anywhere on the internet.

Oracle has not confirmed whether this is being actively exploited in the wild and declined to comment when pressed. Silence on exploitation status after a 9.8 drop is not reassuring.

Who Is at Risk

If your organization runs either of these systems, treat this as a five-alarm fire:

  • Oracle Identity Manager 12.2.1.4.0 or 14.1.2.1.0
  • Oracle Web Services Manager 12.2.1.4.0 or 14.1.2.1.0

Critical caveat: Oracle only delivers patches through this program for versions under Premier or Extended Support. If your environment is running an unsupported version, you are on your own - and you are exposed.

How Developers and Security Teams Can Respond

  • Apply the patch immediately - Oracle is using "strongly recommends" language, which in enterprise-speak means do it now
  • Audit your exposure - identify any internet-facing Oracle Identity Manager or Web Services Manager endpoints
  • Block external HTTP access where the service does not need to be public-facing
  • Check your support status - unsupported versions need an emergency upgrade path, not just a patch discussion
  • Monitor for exploitation indicators - unusual process spawning, unexpected outbound connections, or privilege escalation patterns on hosts running these services

Unauthenticated RCE on identity management infrastructure is as bad as it sounds. These systems control who gets access to what across your entire enterprise. A compromised identity platform does not just mean one breach - it means every door is potentially open.


Is your app vulnerable to similar attacks? Run an automated scan in 3 minutes with VibeShield.

Free security scan

Is your app vulnerable to similar attacks?

VibeWShield automatically scans for these and 18 other security checks in under 3 minutes.

Scan your app free