Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21928: Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. in Oracle Corporation Oracle Solaris

0
Medium
VulnerabilityCVE-2026-21928cvecve-2026-21928
Published: Tue Jan 20 2026 (01/20/2026, 21:56:22 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Solaris

Description

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:27:43 UTC

Technical Analysis

CVE-2026-21928 is a vulnerability in the Oracle Solaris 11 kernel component that allows an unauthenticated attacker with network access via TCP to read a subset of data accessible on the Solaris system without authorization. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS 3.1 base score is 5.3, indicating a medium severity primarily due to confidentiality impact. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), meaning the vulnerability affects the same security scope. Successful exploitation results in unauthorized disclosure of information but does not affect system integrity or availability. No patches are currently linked, and no known exploits have been observed in the wild, but the vulnerability is considered easily exploitable given the low complexity and lack of authentication requirements. The vulnerability affects Oracle Solaris 11, a widely used UNIX operating system in enterprise environments, particularly in sectors requiring robust and scalable infrastructure such as finance, telecommunications, and government. The vulnerability allows attackers to leverage network access to extract sensitive data, which could aid in further attacks or data breaches.

Potential Impact

The primary impact of CVE-2026-21928 is unauthorized disclosure of sensitive information from Oracle Solaris 11 systems. This can lead to confidentiality breaches, potentially exposing sensitive operational or user data. Although the vulnerability does not affect integrity or availability, the leaked information could be leveraged by attackers to facilitate subsequent attacks, such as privilege escalation or lateral movement within a network. Organizations relying on Oracle Solaris for critical infrastructure may face increased risk of data leakage, regulatory non-compliance, and reputational damage. The ease of exploitation without authentication or user interaction increases the threat level, especially for systems exposed to untrusted networks. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future exploitation. Enterprises with Solaris 11 deployments must consider the risk of targeted attacks, especially in sectors handling sensitive data or operating in high-threat environments.

Mitigation Recommendations

1. Apply official patches from Oracle as soon as they become available to address the vulnerability in the Solaris kernel. 2. Restrict network access to Oracle Solaris 11 systems by implementing strict firewall rules that limit TCP connections to trusted hosts and networks only. 3. Employ network segmentation to isolate Solaris systems from untrusted or public networks, reducing exposure to potential attackers. 4. Monitor network traffic for unusual or unauthorized TCP connection attempts targeting Solaris systems, using intrusion detection or prevention systems. 5. Conduct regular security assessments and vulnerability scans on Solaris environments to identify and remediate potential exposures. 6. Implement least privilege principles and ensure sensitive data on Solaris systems is encrypted or otherwise protected to minimize impact if unauthorized read access occurs. 7. Maintain up-to-date incident response plans that include procedures for handling data exposure incidents related to Solaris systems. 8. Educate system administrators and security teams about this vulnerability and the importance of timely patching and network controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.709Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc484623b1157c519f39

Added to database: 1/20/2026, 10:06:00 PM

Last enriched: 3/3/2026, 6:27:43 PM

Last updated: 3/24/2026, 9:07:36 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses