HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical Remote Code Execution (CVE‑2026‑21992) in Oracle Identity Manager Threatens Enterprise IAM Deployments

Oracle disclosed CVE‑2026‑21992, a critical unauthenticated RCE flaw affecting Oracle Identity Manager and Web Services Manager. With a CVSS score of 9.8, the vulnerability can let attackers take full control of IAM platforms, exposing downstream applications and data. TPRM teams must patch immediately and enforce network mitigations to protect the supply chain.

🛡️ LiveThreat™ Intelligence · 📅 March 23, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
securityaffairs.com

Critical Remote Code Execution (CVE‑2026‑21992) in Oracle Identity Manager Threatens Enterprise IAM Deployments

What It Is – Oracle Identity Manager (OIM) and Oracle Web Services Manager (OWSM) contain a critical remote‑code‑execution flaw (CVE‑2026‑21992) that allows an unauthenticated attacker to execute arbitrary code over HTTP. The vulnerability carries a CVSS 9.8 score and is described by Oracle as “easily exploitable.”

Exploitability – No public exploits have been observed for CVE‑2026‑21992, but the same code path was actively probed in 2025 for a related CVE (CVE‑2025‑61757). The high CVSS rating and unauthenticated vector make exploitation highly probable once a weaponized exploit is released.

Affected Products – Oracle Identity Manager 12.2.1.4.0, 14.1.2.1.0 and Oracle Web Services Manager 12.2.1.4.0, 14.1.2.1.0.

TPRM Impact – Organizations that rely on Oracle‑provided IAM as a third‑party service face a supply‑chain risk: a successful exploit could give an attacker full control of authentication flows, user directories, and downstream applications, leading to data breach, credential theft, and service outage across the enterprise ecosystem.

Recommended Actions

  • Deploy the Oracle Critical Patch Update (October 2025) that resolves CVE‑2026‑21992 immediately.
  • Verify that all OIM/OWSM instances run a supported version; retire legacy releases that no longer receive patches.
  • Apply network‑level mitigations: block inbound HTTP to the OIM/OWSM management endpoints, enforce TLS‑only communication, and restrict access to trusted IP ranges.
  • Enable comprehensive logging and monitor for anomalous POST requests to /oam or /iam endpoints; correlate with threat‑intel feeds for known attacker IPs.
  • Conduct a rapid risk assessment of downstream applications that trust OIM for SSO or provisioning; prepare incident‑response playbooks for potential credential compromise.

Source: Security Affairs – Oracle fixes critical RCE flaw CVE‑2026‑21992 in Identity Manager

📰 Original Source
https://securityaffairs.com/189796/security/oracle-fixes-critical-rce-flaw-cve-2026-21992-in-identity-manager.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.