Oracle critical alert: preauthenticated failure in Identity Manager and Web Services Manager allows remote execution; apply patches now

Published 3 min de lectura 122 reading

Oracle has published security updates to correct critical vulnerability that affects two of its identity management and web services products. The failure, identified as CVE-2026-21992, has a very high CVSS score (9.8 / 10) and, according to the manufacturer, can be used remotely without authentication, making it a priority threat to any organization using these components.

The products concerned are Oracle Identity Manager and Oracle Web Services Manager in versions 12.2.1.4.0 and 14.1.2.1.0. Oracle has issued a technical notice with the patches and the instructions for their deployment; it is appropriate to review that bulletin and implement them as quickly as possible. You can check Oracle's official release on its security alerts page: Alert CVE-2026-21992 - Oracle and in the company's security blog: Oracle Security Blog.

Oracle critical alert: preauthenticated failure in Identity Manager and Web Services Manager allows remote execution; apply patches now
Image generated with IA.

The NIST database's vulnerability record provides a technical description and highlights its ease of operation: an attacker with network access through HTTP could trigger remote code execution in vulnerable instances. For more technical details and context, the NVD entry is available here: NVD - CVE-2026-21992.

Oracle has not publicly reported confirmed cases of exploitation in production environments due to this vulnerability, but the pre-authenticated nature itself and the high risk score make the warning to apply the patches urgent. In practice, when a failure allows remote execution without credentials, the consequences can range from the escalation of privileges and data theft to the complete taking of the affected system.

This episode recalls that a few months ago the United States Infrastructure and Cybersecurity Agency (CISA) incorporated into its catalogue of vulnerabilities known for active exploitation another failure in Oracle Identity Manager, registered as CVE-2025-61757 which also had a critical score and evidence of exploitation in real environments. The inclusion in the CISA catalogue requires many entities to prioritize their mitigation; you can see the general catalogue of known vulnerabilities exploited on the following page: CISA - Known Exploited Vulnerabilities Catalog and the historical entry in NVD for CVE-2025-61757 in NVD - CVE-2025-61757.

For security teams and managers, the immediate recommendation is two-fold: to apply the official patches as soon as possible and, in the meantime, to minimize the exposure of the affected bodies. This includes restricting access through network controls, placing servers behind firewalls or white IP lists, and monitoring access records in search of abnormal activity that may indicate operating attempts.

Oracle critical alert: preauthenticated failure in Identity Manager and Web Services Manager allows remote execution; apply patches now
Image generated with IA.

Beyond the spot patch, it is appropriate to take the opportunity to review the vulnerability management processes: keep software inventory up-to-date, test updates in pre-production environments, automate deployments when feasible and have verified backup. If you want a reference on good practice in patch management and vulnerabilities, the NIST offers practical guides: NIST SP 800-40 Revision 3.

From a business point of view, caution orders: even if there is no public evidence of exploitation, the combination of network access, no authentication requirements and a technical note with CVSS 9.8 requires priority action. In addition, organizations should coordinate the implementation of updates with maintenance windows, compatibility check and communication with business equipment to minimize operational impact.

Finally, if you manage or depend on Oracle Identity Manager or Web Services Manager, take these measures immediately and document each step. It records the affected versions, validates updates in controlled environments and monitors the intrusion attempt signals. Cybersecurity is, in many cases, a race against time: acting soon greatly reduces the risk of a major incident.

Coverage

Related

More news on the same subject.