Skip to main content
Mallory

Oracle Shifts to Monthly Critical Security Patch Updates

widely-deployed-product-advisoryai-enabled-threat-activity
Updated May 5, 2026 at 04:05 PM2 sources
Share:
Oracle Shifts to Monthly Critical Security Patch Updates

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Oracle said it will replace its quarterly security patching model with monthly Critical Security Patch Updates for ERP, database, and other software products, citing the faster pace of AI-enabled vulnerability discovery. The company said the new cadence is intended to shorten exposure windows as attackers and researchers use AI to identify software flaws more quickly.

The first monthly release is scheduled for May 28, after which Oracle plans to move to a regular third-Tuesday schedule each month. Reported upcoming dates include June 16, July 21, and August 18. The move brings Oracle closer to the monthly patching approach already used by major software vendors including Microsoft, SAP, and Adobe, though those vendors typically release updates on the second Tuesday of the month.

Timeline

  1. May 28, 2026

    Oracle schedules first monthly Critical Security Patch Update

    Oracle said its first monthly Critical Security Patch Update will be released on May 28 as an initial fourth-Thursday release. After that, the company plans to adopt a regular patch cadence on the third Tuesday of each month.

  2. May 5, 2026

    Oracle announces shift from quarterly to monthly security patching

    Oracle said it will move its ERP, database, and other software products from a quarterly security patch cadence to monthly Critical Security Patch Updates. The company cited the faster pace of AI-enabled vulnerability discovery as the reason for the change.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Oracle Critical Patch Update Addresses Multiple Vulnerabilities Across Products

Oracle Critical Patch Update Addresses Multiple Vulnerabilities Across Products

Oracle released its October 2025 Critical Patch Update, addressing security vulnerabilities in a wide range of Oracle products. The advisory highlights the importance of applying the latest patches to mitigate risks associated with these vulnerabilities, which could potentially allow attackers to compromise affected systems. The update includes fixes for several critical flaws, including two severe vulnerabilities in Oracle Marketing products (CVE-2025-53072 and CVE-2025-62481) that could enable full system takeover if left unpatched. Security agencies have urged organizations to review Oracle's advisory and implement the recommended updates promptly to protect their environments. The vulnerabilities span multiple Oracle product lines, underscoring the need for comprehensive patch management and timely response to vendor advisories to reduce exposure to exploitation and potential business impact.

1 months ago
Oracle January Critical Patch Update Fixes CVSS 10.0 Oracle Fusion Middleware Flaw

Oracle January Critical Patch Update Fixes CVSS 10.0 Oracle Fusion Middleware Flaw

Oracle released its January 2026 *Critical Patch Update (CPU)*, delivering **337 security updates addressing 158 unique CVEs** across roughly 30 product families; **27** of the updates were rated **critical**. Tenable’s analysis highlights broad exposure to remotely exploitable issues without authentication across multiple Oracle product lines, and notes **CVE-2026-21945**, a high-severity **SSRF** issue in Oracle Java, was discovered by Tenable Research. A standout issue in the CPU is **CVE-2026-21962** (CVSS **10.0**), an **easily exploitable, unauthenticated, network-reachable (HTTP)** vulnerability in Oracle Fusion Middleware components **Oracle HTTP Server** and the **WebLogic Server Proxy Plug-ins** (Apache and IIS). Successful exploitation can enable **unauthorized creation, deletion, or modification of critical data** and potentially broader downstream impact due to a **scope change** (`S:C`), meaning compromise may significantly affect additional products; affected versions include **12.2.1.4.0**, **14.1.1.0.0**, and **14.1.2.0.0** (with the IIS proxy plug-in affected in **12.2.1.4.0** only).

1 months ago
Oracle Critical Patch Update Addresses Multiple High-Risk Enterprise Product Flaws

Oracle Critical Patch Update Addresses Multiple High-Risk Enterprise Product Flaws

Oracle-related security advisories were issued for multiple enterprise products, including **Oracle Database Server**, **Oracle Fusion Middleware**, **Oracle REST Data Services**, **Oracle Java SE**, **Oracle Financial Services Applications**, and **Oracle E-Business Suite**. Germany's dCERT published separate advisories for each affected product line, indicating broad exposure across core Oracle infrastructure and business application environments. One of the disclosed flaws, **`CVE-2026-34275`**, affects the **Setup and Administration** component of **Oracle Advanced Inbound Telephony** in **Oracle E-Business Suite** versions **12.2.3 through 12.2.15**. Oracle rated the issue **critical** with a **CVSS v3.1 score of 9.8**, stating that an **unauthenticated attacker** with **network access over HTTP** could exploit it to achieve **full takeover** of the affected application. The vulnerability was disclosed as part of Oracle's broader Critical Patch Update, underscoring the need for organizations running Oracle platforms to prioritize patch review and remediation across exposed systems.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.