Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21979: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Planning and Budgeting Cloud Service executes to compromise Oracle Planning and Budgeting Cloud Service. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Planning and Budgeting Cloud Service accessible data. in Oracle Corporation Oracle Planning and Budgeting Cloud Service

0
Medium
VulnerabilityCVE-2026-21979cvecve-2026-21979
Published: Tue Jan 20 2026 (01/20/2026, 21:56:38 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Planning and Budgeting Cloud Service

Description

Vulnerability in the Oracle Planning and Budgeting Cloud Service product of Oracle Hyperion (component: EPM Agent). The supported version that is affected is 25.04.07. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Planning and Budgeting Cloud Service executes to compromise Oracle Planning and Budgeting Cloud Service. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Planning and Budgeting Cloud Service accessible data. Note: Update EPM Agent. Please refer to <a href="https://docs.oracle.com/en/cloud/saas/enterprise-performance-management-common/diepm/epm_agent_downloading_agent_110x80569d70.html">Downloading the EPM Agent for more information. CVSS 3.1 Base Score 4.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N).

AI-Powered Analysis

AILast updated: 01/20/2026, 22:23:33 UTC

Technical Analysis

CVE-2026-21979 is a vulnerability in Oracle Planning and Budgeting Cloud Service (version 25.04.07), specifically within the EPM Agent component. The flaw allows a high privileged attacker who already has logon access to the infrastructure hosting the Oracle service to compromise the Planning and Budgeting Cloud Service itself. The attack requires human interaction from a user other than the attacker, indicating some form of social engineering or tricking a legitimate user to perform an action that enables the exploit. The vulnerability impacts confidentiality by potentially allowing unauthorized access to critical or all data accessible through the Oracle Planning and Budgeting Cloud Service, but does not affect data integrity or availability. The CVSS 3.1 vector (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N) indicates the attack is local (requiring infrastructure access), with low attack complexity, requiring high privileges and user interaction, and impacting confidentiality only. No known exploits have been reported in the wild, but the vulnerability is easily exploitable given the conditions. Oracle recommends updating the EPM Agent component to remediate the issue, with detailed instructions available in their documentation. This vulnerability highlights the risk posed by privileged insiders or attackers who have gained elevated access to cloud infrastructure, emphasizing the need for strict access controls and user awareness to prevent social engineering.

Potential Impact

For European organizations, the impact of CVE-2026-21979 could be significant, especially for those relying on Oracle Planning and Budgeting Cloud Service for financial planning, budgeting, and enterprise performance management. Unauthorized access to sensitive financial data could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), financial loss, and reputational damage. Since the vulnerability requires high privileges and human interaction, insider threats or compromised privileged accounts pose the greatest risk. The confidentiality breach could expose strategic business information, budgets, and forecasts, potentially affecting competitive positioning and market trust. Although availability and integrity are not directly impacted, the loss of confidentiality alone in financial data environments is critical. Organizations with complex cloud infrastructures must also consider the risk of lateral movement by attackers exploiting this vulnerability. The absence of known exploits in the wild provides a window for proactive remediation before widespread attacks occur.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately update the EPM Agent component of Oracle Planning and Budgeting Cloud Service to the latest patched version as recommended by Oracle. 2) Restrict and monitor high privileged access to the infrastructure hosting the Oracle service, employing the principle of least privilege and just-in-time access controls. 3) Enhance user training and awareness to reduce the risk of successful social engineering or inadvertent user interaction that could facilitate exploitation. 4) Implement robust logging and anomaly detection focused on privileged user actions and unusual interactions with the Oracle cloud environment. 5) Conduct regular audits of privileged accounts and infrastructure access to detect and remediate unauthorized access promptly. 6) Employ network segmentation and isolation to limit the attack surface and contain potential compromises. 7) Review and enforce multi-factor authentication (MFA) for all privileged accounts to reduce the risk of credential misuse. 8) Coordinate with Oracle support and subscribe to security advisories to stay informed about further updates or emerging threats related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696ffc4d4623b1157c51a076

Added to database: 1/20/2026, 10:06:05 PM

Last enriched: 1/20/2026, 10:23:33 PM

Last updated: 2/6/2026, 10:02:53 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats