Oracle Issues Emergency Fix for Pre-Auth Remote Code Execution Vulnerability in Identity Manager (CVE-2026-21992)

Oracle-Issues-Emergency-Fix-for-Pre-Auth-Remote-Code-Execution-Vulnerability-in-Identity-Manager-CVE-2026-21992-

Oracle Issues Urgent Fix for Pre-Authentication Remote Code Execution Flaw in Identity Manager Software

On March 23, 2026, Oracle released an out-of-band patch to address a critical vulnerability identified as CVE-2026-21992 in Oracle Identity Manager and Oracle Web Services Manager.

Vulnerability Details

  • The vulnerability allows unauthenticated attackers to execute arbitrary code remotely, compromising the integrity of these software applications.
  • The flaw stems from a lack of authentication for a critical function within the REST WebServices component of Oracle Identity Manager and the Web Services Security component of Oracle Web Services Manager.
  • Attackers exploiting this vulnerability can leverage HTTP and HTTPS protocols without requiring any user interaction, making it particularly concerning for organizations utilizing these solutions.

Affected Versions

  • CVE-2026-21992 affects versions 12.2.1.4.0 and 14.1.2.1.0 of Oracle Identity Manager and Oracle Web Services Manager, respectively.
  • Oracle advises upgrading to supported versions to mitigate this risk, noting that earlier, now unsupported versions may also be vulnerable.
According to Oracle, “Organizations relying on Oracle Identity Manager and Oracle Web Services Manager are strongly advised to apply the recent patches or implement mitigation strategies as soon as possible to prevent potential exploitation of this critical vulnerability.”

Previous Similar Vulnerability

  • A similar vulnerability, CVE-2025-61757, was previously reported in November 2025 and was discovered to stem from the same issue of missing authentication for a critical function.
  • This vulnerability was also patched by Oracle in October 2025 following reports from Assetnote/Searchlight Cyber researchers who had published a detailed technical write-up about the issue prior to its inclusion in the CISA’s Known Exploited Vulnerabilities catalog.


Blog Image

About Author

en_USEnglish