Home / Deep Dives / Oracle CVE-2026-21992
CRITICAL SECURITY CVSS 9.8 PATCH NOW

Oracle CVE-2026-21992: CVSS 9.8 Unauthenticated RCE in Identity Manager — Emergency Patch Analysis

Dillip Chowdary
Dillip Chowdary
Tech Entrepreneur & Innovator · March 28, 2026

Top Security Highlights

  • CVE-2026-21992 scores CVSS 9.8 — pre-authentication, zero user interaction, remote network exploitable
  • Two Oracle products affected: Identity Manager (REST WebServices) and Web Services Manager (WS-Security component)
  • Versions 12.2.1.4.0 and 14.1.2.1.0 confirmed vulnerable — both widely deployed in enterprise IAM stacks
  • Emergency out-of-band patch released March 20, 2026 — not part of Oracle's quarterly CPU cycle
  • No public PoC yet — but predecessor CVE-2025-61757 in same component was actively exploited and added to CISA KEV Nov 2025

Vulnerability Anatomy

CVE-2026-21992 is a missing-authentication vulnerability in Oracle's enterprise identity and access management stack. The flaw lives in the REST WebServices component of Oracle Identity Manager (OIM) and the Web Services Security component of Oracle Web Services Manager (OWSM) — both part of the Oracle Fusion Middleware product family used by thousands of enterprises to manage user provisioning, SSO, and API security policy enforcement.

The CVSS v3.1 vector string AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H decodes to: network-accessible, low complexity, no privileges required, no user interaction, with full confidentiality, integrity, and availability impact. That combination — pre-auth, network-reachable, arbitrary code execution — is the worst-case scenario for an IAM gateway that by design sits at the perimeter of enterprise identity infrastructure.

The root cause is a missing authentication check on a critical REST API endpoint. An unauthenticated attacker who can reach the OIM REST WebServices interface over HTTP can send a crafted request that the server processes without verifying identity, resulting in arbitrary server-side code execution under the application server's OS account — typically an account with broad filesystem and database access in production deployments.

Attribute Value
CVE IDCVE-2026-21992
CVSS Score9.8 (Critical)
Attack VectorNetwork (remote)
Attack ComplexityLow
Privileges RequiredNone (pre-auth)
User InteractionNone
ImpactC:H / I:H / A:H (full)
ProductsOracle Identity Manager, Oracle Web Services Manager
Affected Versions12.2.1.4.0, 14.1.2.1.0
Patch ReleasedMarch 20, 2026 (emergency)
Known ExploitationNot confirmed (no PoC public)

Why Oracle Identity Manager Is a Prime Target

Oracle Identity Manager is not a peripheral system. In large enterprise environments, OIM controls user provisioning across all connected applications — Active Directory, SAP, Salesforce, custom LDAP directories, HR systems, and every SaaS tool in the estate. Compromising OIM does not mean owning one application; it means owning the identity fabric. An attacker with RCE on the OIM application server can create privileged accounts, escalate existing accounts, exfiltrate the entire provisioning database, and silently add backdoor users that persist through password resets and MFA rotations.

Oracle Web Services Manager compounds the attack surface. OWSM enforces WS-Security policies on SOAP and REST services in Oracle SOA Suite and Oracle Service Bus deployments. An RCE in OWSM's security enforcement layer means an attacker can intercept, modify, or forge API traffic between enterprise integration services — silently, at the policy-enforcement gateway itself.

Oracle Fusion Middleware is predominantly deployed in financial services, healthcare, government, and Fortune 500 manufacturing. These organisations have historically been slow to patch Fusion Middleware due to complex change-management pipelines, which attackers know well. The predecessor to this CVE, CVE-2025-61757 in the same REST WebServices component, was added to CISA's KEV catalog in November 2025 — indicating active exploitation in the wild within months of disclosure.

Attack Surface: How Systems Are Exposed

The OIM REST WebServices interface is commonly exposed on port 14000 (HTTP) or 14002 (HTTPS) in default deployments, with the REST API path reachable at /iam/governance/selfservice/api/v1/. In many enterprise deployments, the OIM managed server is placed on an internal network — but accessible from any internal host, including those reachable via VPN, lateral-movement pivot, or supply-chain compromise.

Internet-facing OIM deployments do exist, particularly in organisations running self-service portals. Shodan enumeration historically shows hundreds of publicly accessible Oracle Fusion Middleware endpoints. CVE-2026-21992's pre-auth nature means even an unauthenticated external actor can exploit these without any credential harvesting step.

// Identify OIM REST endpoint exposure — run from internal network
# Check if OIM REST API is reachable (should return 401, not 200)
curl -s -o /dev/null -w "%{http_code}" \
  http://<OIM_HOST>:14000/iam/governance/selfservice/api/v1/users

# Vulnerable if 200 is returned without credentials
# Patched systems return 401 Unauthorized

# OWSM policy manager check
curl -s -o /dev/null -w "%{http_code}" \
  http://<OWSM_HOST>:7001/wsm-pm/validator

Important: These commands are for defenders verifying their own systems. A 200 OK response on the first endpoint without supplying credentials is a strong indicator that the authentication bypass is present and the system is unpatched.

Remediation: Patch and Mitigate

Oracle released the fix as an out-of-band Security Alert on March 20, 2026 — bypassing the standard quarterly Critical Patch Update (CPU) cycle, which signals Oracle's own assessment of urgency. The patch is available via My Oracle Support (MOS) Doc ID 3048977.1.

Immediate Actions (Priority Order)

  1. 1
    Apply the emergency patch from MOS Doc ID 3048977.1 to all OIM 12.2.1.4.0 / 14.1.2.1.0 and OWSM 12.2.1.4.0 / 14.1.2.1.0 instances immediately. Do not wait for the April 2026 CPU.
  2. 2
    Network-level restriction: If patching cannot happen immediately, restrict access to OIM ports 14000/14002 and the WebLogic admin port (7001/7002) to known IP ranges via firewall or WAF rules. This is a workaround, not a fix.
  3. 3
    Audit REST WebServices access logs for anomalous unauthenticated requests to /iam/governance/ paths going back at least 30 days. Successful exploitation would appear as unauthenticated requests returning non-401 responses.
  4. 4
    Review provisioning audit trails in OIM for any unexpected account creation, role assignments, or entitlement grants — especially privileged or admin-level accounts created in the last 30 days.
  5. 5
    Enable MFA on OIM administrative consoles as a defence-in-depth measure, and rotate all service account credentials used by OIM connectors as a precaution.
// Quick patch verification after applying MOS 3048977.1
# Verify OPatch level includes fix
$ORACLE_HOME/OPatch/opatch lspatches | grep 35940752

# Expected output after patching:
# 35940752;Oracle Identity Manager CVE-2026-21992 Fix

# Also verify OWSM patch
$ORACLE_HOME/OPatch/opatch lspatches | grep 35940753

Threat Intelligence Context

The CVE-2026-21992 disclosure pattern closely mirrors two high-profile Oracle Fusion Middleware incidents. CVE-2025-61757, also in OIM's REST WebServices, was publicly disclosed in August 2025 and reached CISA KEV by November 2025 — a roughly 90-day gap from disclosure to confirmed wild exploitation. CVE-2026-21992 was disclosed March 20, 2026. Based on historical cadence, the window before active exploitation attempts narrows to days to weeks, not months.

Oracle IAM infrastructure has been a recurring target in ransomware supply-chain attacks. Threat actors compromise IAM systems to establish persistent, cross-tenant footholds before deploying payloads. Interlock ransomware group has been documented targeting Oracle Fusion Middleware deployments in financial sector campaigns; this new CVE fits exactly the initial-access profile they favour — pre-auth, network-accessible, no phishing required.

Organisations should also note that Oracle's advisory does not list this CVE in the CISA KEV catalog yet — but that is a lagging indicator. Security teams should treat this as actively exploited until proven otherwise, given the component history and threat actor interest.

5 Key Takeaways for Security Teams

  1. 1

    Patch before April CPU. The emergency release signals Oracle views this as time-critical. Don't bundle this into the April quarterly cycle — apply MOS 3048977.1 now to all OIM and OWSM 12.2.1.4.0 / 14.1.2.1.0 instances.

  2. 2

    Treat IAM compromise as full estate compromise. OIM controls provisioning for all downstream applications. An OIM RCE is not a single-system incident — it's a credential-fabric breach requiring a full scope assessment.

  3. 3

    Review 30 days of OIM audit logs retroactively. No PoC does not mean no exploitation. Threat actors often hold 0-days privately. Look for unauthenticated REST calls, unexpected admin account creation, and connector configuration changes.

  4. 4

    Network-segment OIM aggressively. The REST WebServices port (14000/14002) should never be reachable from the open internet or untrusted internal VLANs. Enforce this permanently, not just as a CVE workaround.

  5. 5

    Watch CISA KEV for addition. Given CVE-2025-61757's history (same component, KEV in 90 days), set a CISA KEV feed alert for CVE-2026-21992. If it appears, escalate to P0 incident response immediately regardless of patch status.