Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21992: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager and Oracle Web Services Manager. Successful attacks of this vulnerability can result in takeover of Oracle Identity Manager and Oracle Web Services Manager. in Oracle Corporation Oracle Identity Manager

0
Critical
VulnerabilityCVE-2026-21992cvecve-2026-21992
Published: Fri Mar 20 2026 (03/20/2026, 02:24:16 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Identity Manager

Description

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager and Oracle Web Services Manager. Successful attacks of this vulnerability can result in takeover of Oracle Identity Manager and Oracle Web Services Manager. Note: Oracle Web Services Manager is installed with an Oracle Fusion Middleware Infrastructure. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:07:09 UTC

Technical Analysis

CVE-2026-21992 is a critical security vulnerability identified in Oracle Identity Manager and Oracle Web Services Manager, both components of Oracle Fusion Middleware. The flaw resides in the REST WebServices component of Oracle Identity Manager and the Web Services Security component of Oracle Web Services Manager. It affects versions 12.2.1.4.0 and 14.1.2.1.0. The vulnerability allows an unauthenticated attacker with network access over HTTP to exploit the system without requiring any privileges or user interaction. This means that an attacker can remotely send crafted requests to the vulnerable services and gain full control over the affected Oracle products. The impact covers confidentiality, integrity, and availability, enabling attackers to exfiltrate sensitive data, modify or delete information, and disrupt service operations. Oracle Web Services Manager is installed as part of the Oracle Fusion Middleware Infrastructure, which is widely used in enterprise environments for identity and access management. The CVSS 3.1 score of 9.8 reflects the critical nature of this vulnerability, with an attack vector of network, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it highly exploitable. The underlying weakness corresponds to CWE-306 (Missing Authentication for Critical Function), indicating that the affected components do not properly enforce authentication, allowing unauthorized access. Immediate remediation is essential to prevent potential takeover of Oracle Identity Manager and Oracle Web Services Manager instances.

Potential Impact

The potential impact of CVE-2026-21992 is severe for organizations worldwide that utilize Oracle Identity Manager and Oracle Web Services Manager. Successful exploitation can lead to complete compromise of these systems, which are critical for identity management and web services security in enterprise environments. Attackers could gain unauthorized access to sensitive identity data, manipulate user credentials, escalate privileges, and disrupt authentication and authorization processes. This could facilitate further lateral movement within networks, data breaches, and denial of service conditions. The compromise of identity management infrastructure can undermine the security posture of entire organizations, affecting compliance with regulatory requirements and damaging reputation. Given the critical role of Oracle Fusion Middleware in many sectors, including finance, government, healthcare, and telecommunications, the impact extends beyond individual organizations to potentially affect national security and critical infrastructure. The ease of exploitation and lack of required authentication increase the likelihood of rapid exploitation once public exploits emerge.

Mitigation Recommendations

To mitigate CVE-2026-21992, organizations should take immediate and specific actions beyond generic best practices: 1) Monitor Oracle's official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) In the interim, restrict network access to Oracle Identity Manager and Oracle Web Services Manager interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts only. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting these components. 4) Conduct thorough audits of existing Oracle Fusion Middleware deployments to identify affected versions and configurations. 5) Enhance logging and monitoring to detect anomalous activities related to identity management services. 6) Review and tighten access controls around Oracle Fusion Middleware infrastructure, ensuring minimal necessary exposure. 7) Consider deploying intrusion detection/prevention systems (IDS/IPS) signatures tailored to this vulnerability once available. 8) Educate security teams about the vulnerability specifics to improve incident response readiness. These targeted steps will reduce the attack surface and limit the potential for exploitation until official patches are deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2026-01-05T18:07:34.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bcbde5e32a4fbe5f2545a7

Added to database: 3/20/2026, 3:24:21 AM

Last enriched: 3/27/2026, 7:07:09 PM

Last updated: 5/5/2026, 1:36:20 AM

Views: 8992

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses