Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21940: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM accessible data. in Oracle Corporation Oracle Agile PLM

0
High
VulnerabilityCVE-2026-21940cvecve-2026-21940
Published: Tue Jan 20 2026 (01/20/2026, 21:56:26 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Agile PLM

Description

Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: User and User Group). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

AI-Powered Analysis

AILast updated: 01/20/2026, 22:36:29 UTC

Technical Analysis

CVE-2026-21940 is a vulnerability identified in Oracle Agile PLM version 9.3.6, specifically within the User and User Group component of the Oracle Supply Chain product suite. This flaw allows an unauthenticated attacker with network access over HTTP to exploit the system without requiring any privileges or user interaction. The vulnerability enables unauthorized access to critical data managed by Oracle Agile PLM, potentially exposing sensitive supply chain information. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, no privileges, and no user interaction, resulting in a high confidentiality impact but no impact on integrity or availability. Although no exploits have been reported in the wild yet, the ease of exploitation and the critical nature of the data involved make this a significant threat. Oracle Agile PLM is widely used in manufacturing and supply chain management, making the vulnerability particularly concerning for organizations relying on this software for product lifecycle management. The vulnerability's exploitation could lead to unauthorized disclosure of intellectual property, product designs, and other sensitive data, potentially causing competitive and operational damage.

Potential Impact

For European organizations, the impact of CVE-2026-21940 could be substantial, especially for those in manufacturing, automotive, aerospace, and other industries heavily reliant on Oracle Agile PLM for supply chain and product lifecycle management. Unauthorized access to critical data could lead to intellectual property theft, exposure of confidential supplier and customer information, and disruption of supply chain confidentiality. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to unauthorized data exposure. The vulnerability does not affect integrity or availability directly, so operational disruption may be limited, but the confidentiality breach alone poses a high risk. Organizations with interconnected supply chains and partners using Oracle Agile PLM may face cascading risks if attackers leverage this vulnerability to access broader networks.

Mitigation Recommendations

1. Immediately apply any available patches or security updates from Oracle for Agile PLM version 9.3.6. If patches are not yet available, implement vendor-recommended workarounds or configuration changes to restrict access to the affected components. 2. Restrict network access to Oracle Agile PLM servers by implementing strict firewall rules and network segmentation to limit HTTP access only to trusted internal users and systems. 3. Employ strong authentication and authorization controls around Oracle Agile PLM interfaces, even if the vulnerability itself does not require authentication, to reduce attack surface. 4. Monitor network traffic and logs for unusual HTTP requests or access patterns targeting Oracle Agile PLM endpoints. 5. Conduct a thorough inventory of Oracle Agile PLM deployments and ensure all instances are upgraded or mitigated promptly. 6. Educate IT and security teams about the vulnerability and the importance of rapid response to reduce exposure time. 7. Consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc494623b1157c519f70

Added to database: 1/20/2026, 10:06:01 PM

Last enriched: 1/20/2026, 10:36:29 PM

Last updated: 2/7/2026, 6:52:51 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats