Unauthenticated Remote Code Execution Vulnerability in Oracle Identity Manager and Oracle Web Services Manager
CVE-2026-21992

9.8CRITICAL

What is CVE-2026-21992?

CVE-2026-21992 is a critical vulnerability affecting Oracle Identity Manager and Oracle Web Services Manager, both components of Oracle Fusion Middleware. These products are designed to manage user identities and secure web services, respectively, making them essential for organizations that rely on centralized identity management and service interactions. The vulnerability allows an unauthenticated attacker with network access via HTTP to execute remote code, potentially taking over both Oracle Identity Manager and Oracle Web Services Manager. Given the high CVSS score of 9.8, this flaw can severely impact an organization’s confidentiality, integrity, and availability, leading to unauthorized access and control of sensitive data and systems.

Potential impact of CVE-2026-21992

  1. Unauthorized Access and Control: The vulnerability allows attackers to execute arbitrary code, leading to unauthorized control over critical identity management functions. This could enable them to manipulate user accounts and permissions, jeopardizing system security.

  2. Data Breach Risks: Successful exploitation can compromise sensitive user information stored in Oracle Identity Manager. This could lead to significant data breaches, exposing personal and confidential information to malicious actors.

  3. System Downtime and Operational Disruption: The takeover of core management services can result in significant operational disruption. Organizations may face downtime as they respond to the breach, impacting business continuity and potentially resulting in financial losses.

Affected Version(s)

Oracle Identity Manager 12.2.1.4.0

Oracle Identity Manager 14.1.2.1.0

Oracle Web Services Manager 12.2.1.4.0

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.