Oracle has issued an emergency out-of-band security alert for CVE-2026-21992, a critical vulnerability scoring 9.8 on the CVSS scale that enables unauthenticated remote code execution against Oracle Identity Manager and Web Services Manager components. UK enterprises running internet-facing Oracle Fusion Middleware deployments face immediate risk of complete system compromise through remotely exploitable attacks requiring no user interaction.
CVE-2026-21992 represents a critical authentication bypass flaw that allows attackers to execute arbitrary code on vulnerable systems without requiring valid credentials. The vulnerability affects Oracle Identity Manager 12.2.1.3.0 and 12.2.1.4.0, alongside Oracle Web Services Manager in Oracle Fusion Middleware 12.2.1.3.0 and 12.2.1.4.0 installations.
According to Oracle's security alert, the vulnerability mirrors characteristics of CVE-2025-61757, a previously exploited flaw in the same component architecture. This suggests potential patch bypass techniques may be evolving to target Oracle's identity management infrastructure repeatedly.
Key Facts:
- CVE-2026-21992 enables unauthenticated remote code execution with 9.8 CVSS severity
- Affects Oracle Identity Manager and Web Services Manager in Fusion Middleware 12.2.1.x
- Oracle issued emergency out-of-band patches following vulnerability disclosure
- Similar attack pattern to previously exploited CVE-2025-61757 in same component
Why This Vulnerability Demands Immediate Board Attention
Oracle Identity Manager serves as the central authentication and authorisation hub for many UK enterprise environments, controlling access to critical business systems and sensitive data repositories. A successful exploit grants attackers administrative control over identity management infrastructure, enabling privilege escalation across connected systems and potential lateral movement throughout corporate networks.
The NCSC's most recent guidance on identity and access management emphasises that compromised identity infrastructure represents one of the highest-impact attack vectors facing UK organisations. Previous incidents involving similar Oracle vulnerabilities have resulted in complete domain compromise within hours of initial exploitation.
This latest vulnerability follows concerning patterns observed in the critical Oracle Identity Manager zero-day that emerged earlier this year, suggesting Oracle's identity management platform faces sustained targeting from sophisticated threat actors.
Boardroom Questions
- Have we completed an immediate audit of all Oracle Fusion Middleware deployments to identify vulnerable systems requiring emergency patching?
- What is our current exposure timeline if Oracle Identity Manager compromise occurs, and which critical business systems would be immediately accessible to attackers?
- Do we have sufficient monitoring capabilities to detect unauthorised administrative access to our identity management infrastructure before lateral movement begins?
Quick Diagnostic
- Do you currently run Oracle Identity Manager or Web Services Manager versions 12.2.1.3.0 or 12.2.1.4.0 with internet-facing access?
- Can you confirm whether Oracle's emergency patches for CVE-2026-21992 have been applied across all vulnerable systems within your environment?
- Have you implemented network-level monitoring to detect suspicious administrative authentication attempts against Oracle identity management components?
Related Reading
Critical Oracle Identity Manager Zero-Day Leaves UK Enterprises Exposed to Unauthenticated Takeover — Oracle's emergency patch for CVE-2026-21992 addresses critical 9.8 CVSS vulnerability in Identity Manager allowing unaut
Remote Teams Can't Dodge These New FCA Cyber Reporting Rules — FCA's March 2027 cyber incident reporting requirements create direct compliance obligations for UK financial firms, with
AI Agents Need Corporate Micromanagers to Prevent Data Breaches — With 88% of organisations reporting AI security incidents but only 22% treating agents as identity-bearing entities, UK
Android Payment Bypass Attack Uses System-Level Takeover to Steal UK Banking Credentials — CloudSEK researchers discover new attack method using LSPosed framework to manipulate Android runtime and bypass banking
5 Million UK Companies Left Exposed as Security Flaw Lets Directors Access Any Business Records — Companies House vulnerability exposed confidential data of 5 million UK businesses through basic browser navigation flaw
Strengthen your organisation's security posture

