Skip to main content
Mallory

Oracle January Critical Patch Update Fixes CVSS 10.0 Oracle Fusion Middleware Flaw

widely-deployed-product-advisoryinternet-facing-service-vulnerabilityproof-of-concept-release
Updated March 21, 2026 at 02:48 PM4 sources
Share:
Oracle January Critical Patch Update Fixes CVSS 10.0 Oracle Fusion Middleware Flaw

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Oracle released its January 2026 Critical Patch Update (CPU), delivering 337 security updates addressing 158 unique CVEs across roughly 30 product families; 27 of the updates were rated critical. Tenable’s analysis highlights broad exposure to remotely exploitable issues without authentication across multiple Oracle product lines, and notes CVE-2026-21945, a high-severity SSRF issue in Oracle Java, was discovered by Tenable Research.

A standout issue in the CPU is CVE-2026-21962 (CVSS 10.0), an easily exploitable, unauthenticated, network-reachable (HTTP) vulnerability in Oracle Fusion Middleware components Oracle HTTP Server and the WebLogic Server Proxy Plug-ins (Apache and IIS). Successful exploitation can enable unauthorized creation, deletion, or modification of critical data and potentially broader downstream impact due to a scope change (S:C), meaning compromise may significantly affect additional products; affected versions include 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0 (with the IIS proxy plug-in affected in 12.2.1.4.0 only).

Timeline

  1. Jan 20, 2026

    Oracle discloses and fixes critical CVE-2026-21962 in Fusion Middleware

    Oracle's January 2026 CPU addressed CVE-2026-21962, a CVSS 10.0 unauthenticated remote vulnerability affecting Oracle HTTP Server and the WebLogic Server Proxy Plug-in. Oracle said the flaw could allow attackers to compromise affected systems over HTTP, including creating, deleting, or modifying data, and urged customers to apply patches or restrict access to exposed HTTP ports.

  2. Jan 20, 2026

    Oracle patches CVE-2026-21945 in Java SE

    Oracle's January 2026 CPU fixed CVE-2026-21945, a high-severity server-side request forgery vulnerability in Oracle Java SE discovered by Tenable Research. The flaw was remotely exploitable without authentication and could be abused to exhaust resources and cause denial of service.

  3. Jan 20, 2026

    Oracle releases January 2026 Critical Patch Update

    On 2026-01-20, Oracle released its January 2026 Critical Patch Update, providing 337 security updates for 158 unique CVEs across 30 product families. The update included 27 critical-severity patches, with many vulnerabilities remotely exploitable without authentication.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

January 21, 2026 at 04:11 AM
January 20, 2026 at 10:15 PM
January 20, 2026 at 09:47 PM

Related Stories

Oracle Critical Patch Update Addresses Multiple High-Risk Enterprise Product Flaws

Oracle Critical Patch Update Addresses Multiple High-Risk Enterprise Product Flaws

Oracle-related security advisories were issued for multiple enterprise products, including **Oracle Database Server**, **Oracle Fusion Middleware**, **Oracle REST Data Services**, **Oracle Java SE**, **Oracle Financial Services Applications**, and **Oracle E-Business Suite**. Germany's dCERT published separate advisories for each affected product line, indicating broad exposure across core Oracle infrastructure and business application environments. One of the disclosed flaws, **`CVE-2026-34275`**, affects the **Setup and Administration** component of **Oracle Advanced Inbound Telephony** in **Oracle E-Business Suite** versions **12.2.3 through 12.2.15**. Oracle rated the issue **critical** with a **CVSS v3.1 score of 9.8**, stating that an **unauthenticated attacker** with **network access over HTTP** could exploit it to achieve **full takeover** of the affected application. The vulnerability was disclosed as part of Oracle's broader Critical Patch Update, underscoring the need for organizations running Oracle platforms to prioritize patch review and remediation across exposed systems.

2 weeks ago
Oracle Critical Patch Update Fixes High-Severity Flaws in Enterprise Manager, Identity Manager, and PeopleTools

Oracle Critical Patch Update Fixes High-Severity Flaws in Enterprise Manager, Identity Manager, and PeopleTools

Oracle disclosed three high-severity vulnerabilities affecting core enterprise products in its Critical Patch Update advisory. **CVE-2026-34279** impacts the Event Management component of Oracle Enterprise Manager Base Platform versions `13.5` and `24.1` and is rated `CVSS 9.1`; Oracle said a high-privileged attacker with network access over HTTP could exploit the flaw to take over the platform, with potential impact extending to additional products because of a scope change. **CVE-2026-34286**, also rated `CVSS 9.1`, affects the Core component of Oracle Identity Manager Connector in Oracle Fusion Middleware version `12.2.1.4.0` and can be exploited by an unauthenticated attacker over HTTPS. Oracle also reported **CVE-2026-34309** in the Security component of PeopleSoft Enterprise PeopleTools versions `8.61` through `8.62`, assigning it a `CVSS 8.1` score. The flaw is described as easily exploitable by a low-privileged attacker with network access over HTTP and could allow unauthorized creation, deletion, or modification of critical data, along with access to sensitive or complete accessible data. Across the three disclosures, Oracle warned that successful exploitation could result in platform compromise, data tampering, and broad unauthorized access in widely deployed enterprise management and identity systems.

2 weeks ago
Oracle Critical Patch Update Addresses Multiple Vulnerabilities Across Products

Oracle Critical Patch Update Addresses Multiple Vulnerabilities Across Products

Oracle released its October 2025 Critical Patch Update, addressing security vulnerabilities in a wide range of Oracle products. The advisory highlights the importance of applying the latest patches to mitigate risks associated with these vulnerabilities, which could potentially allow attackers to compromise affected systems. The update includes fixes for several critical flaws, including two severe vulnerabilities in Oracle Marketing products (CVE-2025-53072 and CVE-2025-62481) that could enable full system takeover if left unpatched. Security agencies have urged organizations to review Oracle's advisory and implement the recommended updates promptly to protect their environments. The vulnerabilities span multiple Oracle product lines, underscoring the need for comprehensive patch management and timely response to vendor advisories to reduce exposure to exploitation and potential business impact.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Oracle January Critical Patch Update Fixes CVSS 10.0 Oracle Fusion Middleware Flaw | Mallory