Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN325
_____________________________________________________________________

DATE                : 23/03/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Oracle Identity Manager, Oracle
                                 Web Services Manager.

=====================================================================
https://www.oracle.com/security-alerts/alert-cve-2026-21992.html
_____________________________________________________________________

Oracle Security Alert Advisory - CVE-2026-21992

Description

This Security Alert addresses vulnerability CVE-2026-21992 in Oracle
Identity Manager and Oracle Web Services Manager. This vulnerability
is remotely exploitable without authentication. If successfully
exploited, this vulnerability may result in remote code execution.

Oracle strongly recommends that customers apply the updates or
mitigations provided by this Security Alert as soon as possible.
Oracle always recommends that customers remain on actively-supported
versions and apply all Security Alerts and Critical Patch Update
security patches without delay.


Affected Products and Patch Information

The security vulnerability addressed by this Security Alert affects
the products listed below.

Please click on the links in the Patch Availability Document column
below to access the documentation for patch availability information
and installation instructions.


Affected Products and Versions 	Patch Availability Document

Oracle Identity Manager, versions 12.2.1.4.0, 14.1.2.1.0 	Fusion Middleware
Oracle Web Services Manager, versions 12.2.1.4.0, 14.1.2.1.0 	Fusion Middleware


Security Alert Supported Products and Versions

Patches released through the Security Alert program are provided only
for product versions that are covered under the Premier Support or
Extended Support phases of the Lifetime Support Policy. Oracle
recommends that customers plan product upgrades to ensure that patches
released through the Security Alert program are available for the
versions they are currently running.

Product releases that are not under Premier Support or Extended Support
are not tested for the presence of vulnerabilities addressed by this
Security Alert. However, it is likely that earlier versions of affected
releases are also affected by these vulnerabilities. As a result,
Oracle recommends that customers upgrade to supported versions.

Fusion Middleware products are patched in accordance with the Software
Error Correction Support Policy explained in My Oracle Support Note
KB65129. Please review the Technical Support Policies for further
guidelines regarding support policies and phases of support.


References

    Oracle Critical Patch Updates, Security Alerts and Bulletins
    Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions
    Risk Matrix Definitions
    Use of Common Vulnerability Scoring System (CVSS) by Oracle
    English text version of the risk matrices
    CSAF JSON version of the risk matrices
    Map of CVE to Advisory/Alert
    Oracle Lifetime support Policy
    JEP 290 Reference Blocklist Filter

Risk Matrix Content

Risk matrices list only security vulnerabilities that are newly
addressed by the patches associated with this advisory. Risk matrices
for previous security patches can be found in previous Critical Patch
Update advisories and Alerts. An English text version of the risk
matrices provided in this document is here.

Security vulnerabilities are scored using CVSS version 3.1 (see Oracle
CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).

Oracle conducts an analysis of each security vulnerability addressed by
a Security Alert. Oracle does not disclose detailed information about
this security analysis to customers, but the resulting Risk Matrix and
associated documentation provide information about conditions required
to exploit the vulnerability and the potential impact of a successful
exploit. Oracle provides this information so that customers may
conduct their own risk analysis based on the particulars of their
product usage. For more information, see Oracle vulnerability
disclosure policies.

The protocol in the risk matrix implies that all of its secure variants
are affected as well. For example, if HTTP is listed as an affected
protocol, it implies that HTTPS is also affected. The secure variant
of a protocol is listed in the risk matrix only if it is the only
variant affected.

 
Modification History
Date 	Note
2026-March-20 	Rev 2. Added note.
2026-March-19 	Rev 1. Initial Release.

 
 
Oracle Fusion Middleware Risk Matrix

This Security Alert contains 2 new security patches for Oracle Fusion
Middleware.  Both of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.  The English text form of this Risk Matrix
can be found here.


CVE ID 	Product 	Component 	Protocol 	Remote Exploit
without Auth.? 	CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) 	
Supported Versions Affected 	Notes
Base Score 	Attack Vector 	Attack Complex 	Privs Req'd 
User Interact 	Scope 	Confid-entiality 	Inte-grity 	
Avail-ability

CVE-2026-21992 	Oracle Identity Manager 	REST WebServices 	HTTP 	Yes 	9.8 	Network 	Low 	None 	None 	Un-
changed 	High 	High 	High 	12.2.1.4.0, 14.1.2.1.0 	
 
CVE-2026-21992 	Oracle Web Services Manager 	Web Services Security 	HTTP 	Yes 	9.8 	Network 	Low 	None 	None 	Un-
changed 	High 	High 	High 	12.2.1.4.0, 14.1.2.1.0 	See Note 1


Notes:

    Oracle Web Services Manager is installed with an Oracle Fusion Middleware Infrastructure.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




