Oracle Shifts to Monthly Critical Security Patch Updates
Oracle said it will replace its quarterly security patching model with monthly Critical Security Patch Updates for ERP, database, and other software products, citing the faster pace of AI-enabled vulnerability discovery. The company said the new cadence is intended to shorten exposure windows as attackers and researchers use AI to identify software flaws more quickly.
The first monthly release is scheduled for May 28, after which Oracle plans to move to a regular third-Tuesday schedule each month. Reported upcoming dates include June 16, July 21, and August 18. The move brings Oracle closer to the monthly patching approach already used by major software vendors including Microsoft, SAP, and Adobe, though those vendors typically release updates on the second Tuesday of the month.
Timeline
May 28, 2026
Oracle schedules first monthly Critical Security Patch Update
Oracle said its first monthly Critical Security Patch Update will be released on May 28 as an initial fourth-Thursday release. After that, the company plans to adopt a regular patch cadence on the third Tuesday of each month.
May 5, 2026
Oracle announces shift from quarterly to monthly security patching
Oracle said it will move its ERP, database, and other software products from a quarterly security patch cadence to monthly Critical Security Patch Updates. The company cited the faster pace of AI-enabled vulnerability discovery as the reason for the change.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Sources
Related Stories

Oracle Critical Patch Update Addresses Multiple Vulnerabilities Across Products
Oracle released its October 2025 Critical Patch Update, addressing security vulnerabilities in a wide range of Oracle products. The advisory highlights the importance of applying the latest patches to mitigate risks associated with these vulnerabilities, which could potentially allow attackers to compromise affected systems. The update includes fixes for several critical flaws, including two severe vulnerabilities in Oracle Marketing products (CVE-2025-53072 and CVE-2025-62481) that could enable full system takeover if left unpatched. Security agencies have urged organizations to review Oracle's advisory and implement the recommended updates promptly to protect their environments. The vulnerabilities span multiple Oracle product lines, underscoring the need for comprehensive patch management and timely response to vendor advisories to reduce exposure to exploitation and potential business impact.
1 months ago
Oracle January Critical Patch Update Fixes CVSS 10.0 Oracle Fusion Middleware Flaw
Oracle released its January 2026 *Critical Patch Update (CPU)*, delivering **337 security updates addressing 158 unique CVEs** across roughly 30 product families; **27** of the updates were rated **critical**. Tenable’s analysis highlights broad exposure to remotely exploitable issues without authentication across multiple Oracle product lines, and notes **CVE-2026-21945**, a high-severity **SSRF** issue in Oracle Java, was discovered by Tenable Research. A standout issue in the CPU is **CVE-2026-21962** (CVSS **10.0**), an **easily exploitable, unauthenticated, network-reachable (HTTP)** vulnerability in Oracle Fusion Middleware components **Oracle HTTP Server** and the **WebLogic Server Proxy Plug-ins** (Apache and IIS). Successful exploitation can enable **unauthorized creation, deletion, or modification of critical data** and potentially broader downstream impact due to a **scope change** (`S:C`), meaning compromise may significantly affect additional products; affected versions include **12.2.1.4.0**, **14.1.1.0.0**, and **14.1.2.0.0** (with the IIS proxy plug-in affected in **12.2.1.4.0** only).
1 months ago
Oracle Critical Patch Update Addresses Multiple High-Risk Enterprise Product Flaws
Oracle-related security advisories were issued for multiple enterprise products, including **Oracle Database Server**, **Oracle Fusion Middleware**, **Oracle REST Data Services**, **Oracle Java SE**, **Oracle Financial Services Applications**, and **Oracle E-Business Suite**. Germany's dCERT published separate advisories for each affected product line, indicating broad exposure across core Oracle infrastructure and business application environments. One of the disclosed flaws, **`CVE-2026-34275`**, affects the **Setup and Administration** component of **Oracle Advanced Inbound Telephony** in **Oracle E-Business Suite** versions **12.2.3 through 12.2.15**. Oracle rated the issue **critical** with a **CVSS v3.1 score of 9.8**, stating that an **unauthenticated attacker** with **network access over HTTP** could exploit it to achieve **full takeover** of the affected application. The vulnerability was disclosed as part of Oracle's broader Critical Patch Update, underscoring the need for organizations running Oracle platforms to prioritize patch review and remediation across exposed systems.
2 weeks ago