Oracle has published security updates to correct critical vulnerability that affects two of its identity management and web services products. The failure, identified as CVE-2026-21992, has a very high CVSS score (9.8 / 10) and, according to the manufacturer, can be used remotely without authentication, making it a priority threat to any organization using these components.
The products concerned are Oracle Identity Manager and Oracle Web Services Manager in versions 12.2.1.4.0 and 14.1.2.1.0. Oracle has issued a technical notice with the patches and the instructions for their deployment; it is appropriate to review that bulletin and implement them as quickly as possible. You can check Oracle's official release on its security alerts page: Alert CVE-2026-21992 - Oracle and in the company's security blog: Oracle Security Blog.

The NIST database's vulnerability record provides a technical description and highlights its ease of operation: an attacker with network access through HTTP could trigger remote code execution in vulnerable instances. For more technical details and context, the NVD entry is available here: NVD - CVE-2026-21992.
Oracle has not publicly reported confirmed cases of exploitation in production environments due to this vulnerability, but the pre-authenticated nature itself and the high risk score make the warning to apply the patches urgent. In practice, when a failure allows remote execution without credentials, the consequences can range from the escalation of privileges and data theft to the complete taking of the affected system.
This episode recalls that a few months ago the United States Infrastructure and Cybersecurity Agency (CISA) incorporated into its catalogue of vulnerabilities known for active exploitation another failure in Oracle Identity Manager, registered as CVE-2025-61757 which also had a critical score and evidence of exploitation in real environments. The inclusion in the CISA catalogue requires many entities to prioritize their mitigation; you can see the general catalogue of known vulnerabilities exploited on the following page: CISA - Known Exploited Vulnerabilities Catalog and the historical entry in NVD for CVE-2025-61757 in NVD - CVE-2025-61757.
For security teams and managers, the immediate recommendation is two-fold: to apply the official patches as soon as possible and, in the meantime, to minimize the exposure of the affected bodies. This includes restricting access through network controls, placing servers behind firewalls or white IP lists, and monitoring access records in search of abnormal activity that may indicate operating attempts.

Beyond the spot patch, it is appropriate to take the opportunity to review the vulnerability management processes: keep software inventory up-to-date, test updates in pre-production environments, automate deployments when feasible and have verified backup. If you want a reference on good practice in patch management and vulnerabilities, the NIST offers practical guides: NIST SP 800-40 Revision 3.
From a business point of view, caution orders: even if there is no public evidence of exploitation, the combination of network access, no authentication requirements and a technical note with CVSS 9.8 requires priority action. In addition, organizations should coordinate the implementation of updates with maintenance windows, compatibility check and communication with business equipment to minimize operational impact.
Finally, if you manage or depend on Oracle Identity Manager or Web Services Manager, take these measures immediately and document each step. It records the affected versions, validates updates in controlled environments and monitors the intrusion attempt signals. Cybersecurity is, in many cases, a race against time: acting soon greatly reduces the risk of a major incident.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...