LIVE NEWS
  • Tehran says ‘progress’ made in talks with US
  • Google and OpenAI are making a run at Claude’s desktop moat, and Anthropic is making it easy
  • DeBriefed 17 April 2026: Fossil-fuel power slumps | ‘Super’ El Niño warning | Afghanistan’s climate struggle
  • Senior official ousted over Peter Mandelson security row to face MPs
  • Scientists say this type of olive oil could boost brain power
  • The Best Smart Home Accessories to Boost Your Curb Appeal (2026)
  • Trinidad and Tobago police uncover 56 bodies, mostly children, at cemetery | Crime News
  • The best TV antennas to buy in 2024
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Oracle’s Fusion Middleware Has Critical RCE Flaw
Cybersecurity

Oracle’s Fusion Middleware Has Critical RCE Flaw

primereportsBy primereportsMarch 22, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Oracle’s Fusion Middleware Has Critical RCE Flaw
Share
Facebook Twitter LinkedIn Pinterest Email


Oracle broke its usual patch cycle this week to announce a critical vulnerability in its Fusion Middleware.

On March 19, the enterprise software and cloud computing giant released a special security alert for the newly discovered issue, now labeled CVE-2026-21992. It affects the Oracle Identity Manager (OIM) and Oracle Web Services Manager (OWSM), and its severity is obvious at first glance, as it enables remote code execution (RCE) and requires no authentication to exploit. 

In theory, attackers could use CVE-2026-21992 to manipulate the identities, roles, and policies an organization defines through OIM, useful for lateral movement and escalating privileges in those organizations’ networks. They could also change or turn off security policies organizations define in OWSM, making other malicious cyber activity easier to pull off. And that’s to say nothing of all the sensitive data they could steal, the services they could cut off, and the other creative commands they might utilize in the process.

Related:‘Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft

So far, there’s no publicly known evidence that it has been exploited in the wild, but if past is prelude, that’s likely to change, and the blast radius could be significant. According to data from business intelligence aggregators Enlyft and Landbase, OIM is deployed at north of 1,000 organizations, mostly in the United States, and largely in IT and other tech industries. Notable is its popularity with large multinationals, like Walmart, Huawei, and ExxonMobil. A plurality of its customers fall into demographic categories like: employs more than 10,000 employees, earns more than $1 billion in annual revenue, etc.

Critical RCE Bug in Oracle Fusion Middleware

Oracle typically organizes software fixes into quarterly updates for customers. The exception to the rule is when vulnerabilities are discovered that are simply too serious and too urgent to wait. In the past decade and a half, Oracle has released specialized security alerts for such vulnerabilities just around 30 times.

The debutante to the group has received a 9.8 out of 10 Common Vulnerability Scoring System (CVSS). It’s an issue in the HTTP application programming interface (API) surface of Oracle’s identity and Web services security stack; and according to the risk matrix published in Oracle’s advisory, attacking it requires relatively little complexity.

In many ways, CVE-2026-21992 resembles another recent OIM vulnerability that also earned a 9.8 CVSS score: CVE-2025-61757, first disclosed last October. Both affect OIM’s REST WebServices component, affect the same software versions (12.2.1.4.0 and 14.1.2.1.0), and allow for RCE. For these reasons, Tenable senior staff research engineer Satnam Narang speculates that the new issue could possibly be related to the old. There’s no evidence of this in Oracle’s security advisory, however. Dark Reading reached out to Oracle to confirm whether the two might be related. Oracle declined to comment.

Related:Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos

If CVE-2026-21992 does go the way of CVE-2025-61757, it won’t be a good thing. Compared with other OIM vulnerabilities, researchers at Searchlight Cyber described the October bug as “somewhat trivial and easily exploitable,” and indeed it was added to the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog the following month. That made it just the sixth-ever Fusion Middleware vulnerability to make the list, and the first one in three years.

“If this one follows a similar path, it’s likely that attackers are going to be able to exploit this pretty easily,” Tenable’s Narang says, predicting that they might already be preparing their attacks now. “If this is an exposed endpoint that attackers can access, and it doesn’t veer too differently from the last one, there’s a possibility that we will see some exploitations. I don’t expect this to be widespread exploitation but, you know, exploitation is still exploitation.”

Related:Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Large Organizations Have Patching Complications

Considering the average size of Oracle’s customers, CVE-2026-21992 may be of particular interest to big game hunters on the Dark Web.

Organizational size and complexity can also complicate patching processes, in some cases. “It’s a little bit more cumbersome depending on the size of the organization, and the footprint of the installed software. Those can definitely be issues that create more challenges for organizations,” Narang says.

“Every implementation is going to be different for each organization,” he adds. “I think that’s also why, over the years, we do see this [widely varying] time between patches becoming available and organizations patching. Sometimes it’s within days, sometimes it’s within months, because of patch management policies.” He adds, “That’s why known vulnerabilities are a problem across the board. And why we continue to see older vulnerabilities exploited months and even years later.”



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTSA Wait Times: the Airports With the Longest Delays and How to Check
Next Article The 7 Largest Publicly Traded Ethereum Treasury Firms
primereports
  • Website

Related Posts

Cybersecurity

[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

April 18, 2026
Cybersecurity

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

April 18, 2026
Cybersecurity

Google wipes out 602 million scam ads with Gemini on duty

April 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Tehran says ‘progress’ made in talks with US
  • Google and OpenAI are making a run at Claude’s desktop moat, and Anthropic is making it easy
  • DeBriefed 17 April 2026: Fossil-fuel power slumps | ‘Super’ El Niño warning | Afghanistan’s climate struggle
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.