ForumsExploitsUnauthenticated RCE in Oracle IdM (CVE-2026-21992): Who is patching tonight?

Unauthenticated RCE in Oracle IdM (CVE-2026-21992): Who is patching tonight?

K8s_SecOps_Mei 3/22/2026 USER

Saw the advisory drop today. CVE-2026-21992 is a nightmare scenario. We're looking at a CVSS score of 9.8 for an unauthenticated RCE impacting both Oracle Identity Manager and Web Services Manager. Oracle explicitly noted in their advisory that this is remotely exploitable without authentication. If you have this exposed externally, you are effectively operating an open door for attackers right now.

What makes this particularly nasty is the target: Identity Manager. If an attacker gains RCE here, they likely have the keys to the kingdom regarding your SSO and user provisioning flows. The complexity of patching Oracle stacks is no joke, but with a 9.8, we don't have the luxury of waiting.

For those of us managing Windows-based deployments, I quickly threw together a PowerShell snippet to help identify potentially vulnerable instances by checking the file properties of the core WAR files. This isn't a substitute for the official OPatch check, but it helps triage assets fast:

$paths = @("C:\Oracle\Middleware", "D:\Oracle\Middleware")
foreach ($path in $paths) {
    if (Test-Path $path) {
        Get-ChildItem -Path $path -Recurse -Filter "idm.war" -ErrorAction SilentlyContinue | 
        Select-Object FullName, @{N="Version"; E={(Get-Item $_.FullName).VersionInfo.FileVersion}}
    }
}

Also, keep an eye on your WebLogic logs if IdM is deployed there. Given the CVSS score, I'm assuming everyone is prioritizing this over the standard quarterly update cycle. How are you handling the downtime? Is everyone going with the out-of-band emergency patch, or are you relying on WAF rules until the next maintenance window?

DL
DLP_Admin_Frank3/22/2026

We are already seeing scanning activity targeting port 14000 (default OIM port) from a few distinct IPs. We've pushed a temporary deny-all rule at the edge for non-VPN traffic until we patch. I'd strongly suggest checking your logs for any POST requests to /identity/login or similar endpoints with malformed JSON—that seems to be the trigger vector based on early analysis.

SA
SA_Admin_Staff3/22/2026

Patch fatigue is real, but a 9.8 on IdM isn't something you ignore. I'm worried about internal exposure too, not just internet-facing. Lateral movement from a compromised dev box to IdM would be trivial with unauth RCE. Make sure you scan your internal VLANs as well, not just the perimeter.

DE
DevSecOps_Lin3/22/2026

For anyone running this on WebLogic, remember to check the OPatch version before applying the patch. I've seen several people brick their environments this morning because their OPatch utility was too old for the July 2026 PSU. Always verify prerequisites in a non-prod environment first!

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created3/22/2026
Last Active3/22/2026
Replies3
Views141