HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical Unauthenticated RCE in Oracle Identity Manager (CVE-2026-21992) Threatens Enterprise IAM

Oracle has issued patches for a critical remote‑code‑execution flaw (CVE‑2026‑21992) in Oracle Identity Manager and Web Services Manager. The vulnerability is exploitable without authentication and carries a CVSS score of 9.8, posing a severe supply‑chain risk for organizations that rely on Oracle IAM solutions.

🛡️ LiveThreat™ Intelligence · 📅 March 21, 2026· 📰 thehackernews.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
thehackernews.com

Critical Unauthenticated RCE in Oracle Identity Manager (CVE-2026-21992) Threatens Enterprise IAM

What It Is — Oracle Identity Manager (OIM) and Oracle Web Services Manager contain a critical remote‑code‑execution flaw (CVE‑2026‑21992) that can be triggered without any authentication. The vulnerability scores 9.8 / 10 on the CVSS v3.1 scale, indicating a near‑certain compromise if exploited.

Exploitability — The flaw is remotely exploitable and requires no credentials; proof‑of‑concept code has been publicly disclosed, and threat actors are actively scanning for vulnerable deployments.

Affected ProductsOracle Identity Manager (all supported versions) and Oracle Web Services Manager (bundled with OIM).

TPRM Impact — As a core identity‑and‑access‑management platform, a breach in OIM can cascade to downstream SaaS applications, on‑premise systems, and partner ecosystems, creating a high‑impact supply‑chain risk.

Recommended Actions

  • Deploy Oracle’s security patches for OIM and Web Services Manager immediately.
  • Verify patch installation via Oracle’s advisory checklist and conduct post‑patch testing.
  • Enforce network segmentation for IAM services and restrict inbound traffic to trusted sources.
  • Enable comprehensive logging and real‑time monitoring for anomalous process execution.
  • Review and rotate any privileged credentials that may have been stored in OIM.

Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/03/oracle-patches-critical-cve-2026-21992.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.