Oracle Ships Emergency Patch for Critical Identity Manager RCE
CVE-2026-21992 scores CVSS 9.8 and allows unauthenticated remote code execution on Oracle Identity Manager and Web Services Manager. Patch immediately.
Oracle broke from its quarterly patch schedule yesterday to release an emergency fix for a critical remote code execution vulnerability in Oracle Identity Manager and Oracle Web Services Manager. CVE-2026-21992 carries a CVSS score of 9.8 and requires no authentication to exploit.
The vulnerability affects the REST WebServices component in Identity Manager and the Web Services Security component in Web Services Manager. An attacker with network access over HTTP can achieve full remote code execution on vulnerable systems.
Why Oracle Pushed an Out-of-Band Patch
This marks only the second time Oracle has issued an out-of-band Security Alert for Identity Manager. The first was CVE-2017-10151, a CVSS 10.0 default account vulnerability nearly a decade ago.
The urgency stems from what happened last fall. A related vulnerability in the same REST WebServices component—CVE-2025-61757—was exploited in the wild and added to CISA's Known Exploited Vulnerabilities catalog in November 2025. That flaw involved an authentication bypass where attackers could trick the security filter into treating protected endpoints as publicly accessible by appending parameters like ?WSDL or ;.wadl to URL paths.
Searchlight Cyber researchers characterized CVE-2025-61757 as "somewhat trivial and easily exploitable by threat actors." Oracle clearly learned from that experience. Rather than wait for the next Critical Patch Update, they shipped this fix immediately.
What's Vulnerable
Both affected products share the same vulnerable versions:
- Oracle Identity Manager: 12.2.1.4.0, 14.1.2.1.0
- Oracle Web Services Manager: 12.2.1.4.0, 14.1.2.1.0
Oracle Identity Manager handles enterprise identity governance—user provisioning, access requests, password management, and compliance reporting. It's the system that controls who gets access to what across an organization's application portfolio. Web Services Manager provides security policy enforcement for SOAP and REST services.
Compromising either system gives attackers a foothold at the heart of enterprise identity infrastructure.
Attack Surface Considerations
The vulnerability is remotely exploitable without authentication over standard HTTP. The CVSS vector confirms the worst-case scenario: network attack vector, low complexity, no privileges required, no user interaction needed, and high impact across confidentiality, integrity, and availability.
Oracle deployments running these Fusion Middleware components should assume they're exposed if the REST WebServices interfaces are network-accessible. Many organizations deploy Identity Manager in configurations that expose these APIs to internal networks—sometimes without realizing the full attack surface.
This vulnerability follows a pattern we've seen across enterprise middleware. The VMware Aria Operations RCE added to CISA's KEV catalog this week exploits similar trust assumptions in management interfaces. And Oracle products have been frequent targets—the Clop ransomware campaign that hit Dartmouth exploited a different Oracle E-Business Suite flaw to steal data from over 100 organizations.
Patch Now
Oracle's Security Alert advisory links to patches available through the Fusion Middleware Patch Availability Document (KB878741). The advisory revision history shows the initial release on March 19 with a second revision added March 20—suggesting Oracle continues refining the guidance.
Organizations should prioritize this patch for several reasons:
- The attack is trivial: Pre-auth RCE over HTTP means any script kiddie can exploit it once proof-of-concept code surfaces
- Related flaw was exploited: CVE-2025-61757 in the same component saw active exploitation
- Identity systems are high-value targets: Compromising the system that provisions access gives attackers the keys to everything
If patching immediately isn't possible, Oracle recommends applying network segmentation to limit exposure of the affected components. Restricting access to trusted networks won't eliminate the risk, but it reduces the attack surface while you plan maintenance windows.
What to Watch For
No public proof-of-concept exists yet according to Tenable's analysis. That window won't last. Given the simplicity of exploiting CVE-2025-61757, researchers and threat actors alike will reverse-engineer the March 19 patch to identify the vulnerable code paths.
Review access logs for unusual requests to REST WebServices endpoints. The authentication bypass pattern from the related flaw—URL manipulation with WSDL or WADL parameters—provides a template for what anomalous traffic might look like.
Tenable has released detection plugins for CVE-2026-21992. Organizations using their Attack Surface Management platform can identify exposed Oracle WebLogic Server instances that might be running vulnerable configurations.
Why This Matters
Identity management systems sit at the center of enterprise security architecture. They determine who can access what resources, enforce segregation of duties, and maintain audit trails for compliance. An attacker with code execution on the identity platform can provision themselves access to anything—or disable controls for other threat actors.
For organizations tracking hacking news and vulnerability trends, this disclosure reinforces a pattern: enterprise middleware and identity systems remain high-priority targets. The combination of privileged access, complex deployments, and infrequent patching makes them attractive to ransomware operators and nation-state actors alike.
Oracle's decision to ship an out-of-band patch signals genuine concern. They don't break from their quarterly cadence lightly. Treat this with the urgency Oracle's own actions suggest it deserves.
Related Articles
Veeam Patches Five Critical RCE Flaws in Backup & Replication
Veeam releases emergency patches for five critical RCE vulnerabilities (CVSS 9.9) affecting Backup & Replication. Domain users can fully compromise backup servers.
Mar 12, 2026CISA Adds n8n RCE Flaw to KEV as 24,700 Instances Sit Exposed
CVE-2025-68613 allows authenticated attackers to execute arbitrary code on n8n workflow servers. CISA gives federal agencies until March 25 to patch.
Mar 12, 2026WeKnora AI Framework Hit with Twin CVSS 9.9 RCE Flaws
Critical command injection and SQL bypass vulnerabilities in Tencent's WeKnora LLM framework allow unauthenticated RCE. Patch to versions 0.2.10 and 0.2.12 now.
Mar 8, 2026FreeScout Zero-Click RCE Lets Hackers Hijack Servers via Email
CVE-2026-28289 allows unauthenticated attackers to achieve full server compromise by sending a single crafted email. CVSS 10.0—patch to 1.8.207 now.
Mar 6, 2026