Oracle Identity Manager Unauthenticated RCE
Oracle released an out-of-band emergency Security Alert in March 2026 for CVE-2026-21992 — a CVSS 9.8 Critical unauthenticated remote code execution vulnerability in Oracle Identity Manager (OIM/OIG) REST WebServices. Attackers can execute arbitrary code on affected systems over HTTP without credentials. Immediate patching required.
Why This Alert Demands Immediate Action
Six observations that distinguish CVE-2026-21992 from a routine Oracle security advisory.
Out-of-Band Emergency Alert
Oracle issued this outside the normal quarterly CPU cycle. Oracle reserves out-of-band alerts for the most severe risks — patching cannot wait for the next quarterly window.
Unauthenticated & Remotely Exploitable
Attackers can exploit the vulnerability over HTTP without credentials. Any internet-exposed (or accessible-from-corporate-network) OIM instance is at immediate risk.
Complete System Takeover
NVD indicates compromise can result in complete takeover of affected systems. RCE on identity infrastructure means attackers gain persistent privileged access to identity provisioning.
Identity Infrastructure is High-Value
Oracle Identity Manager/OIG environments manage enterprise-wide provisioning and access governance. Compromise grants attackers control of who can access what across all integrated systems.
Hidden Exposure via OWSM
Oracle Web Services Manager (OWSM) is commonly bundled with Fusion Middleware Infrastructure. Many organisations have OWSM deployed without realising it — meaning unknown exposure surface.
Similar to CVE-2025-61757 (CISA KEV)
CVE-2025-61757 reached CISA's Known Exploited Vulnerabilities catalog after active exploitation in the wild. CVE-2026-21992's similarity suggests adapted exploits may already exist or emerge rapidly.
Immediate Action Plan
- Inventory: Identify all Oracle Identity Manager (OIM/OIG) and Oracle Web Services Manager (OWSM) deployments — including bundled installations inside Fusion Middleware Infrastructure.
- Patch: Apply Oracle's emergency CVE-2026-21992 patch to all affected instances immediately.
- Compensating control (if patching is delayed): Restrict network access to OIM REST WebServices APIs at the firewall/WAF layer. Block external HTTP access to identity infrastructure.
- Threat hunt: Review OIM/OIG logs for the past 30+ days. Look for suspicious provisioning events, unexpected role assignments, credential-store access, or new admin accounts.
- Validate: After patching, run full identity regression — login flows, SSO, SCIM provisioning, role assignments, password management, reconciliation jobs.
- Document: Capture evidence of patch application and validation for SOX, ISO 27001, internal audit and customer security reviews.
- Communicate: Notify CISO, internal audit, and any third parties consuming your identity APIs about the alert and your remediation status.
Affected Oracle Components
Components impacted by CVE-2026-21992 and the March 2026 Security Alert.
CVE-2026-21992 Unauthenticated RCE
What changed: Critical out-of-band security alert for unauthenticated HTTP-based remote code execution in Oracle Identity Manager REST WebServices
Why it matters: Compromise of OIM can provide attackers privileged access across enterprise systems and identity infrastructure (Oracle)
CVE-2026-21992 Web Services Security RCE
What changed: Critical unauthenticated RCE vulnerability in OWSM Web Services Security component
Why it matters: OWSM governs enterprise service trust and authentication policies across Fusion Middleware (Oracle)
Emergency Out-of-Band Security Alert
What changed: Oracle issued rare out-of-band patch outside regular CPU cycle due to critical severity
Why it matters: Oracle rarely releases out-of-band alerts; indicates elevated enterprise risk (Tenable®)
REST WebServices Authentication Bypass
What changed: Vulnerability tied to missing authentication enforcement (CWE-306) in REST layer
Why it matters: Vulnerability allows unauthenticated network attackers to execute code remotely (Lab Space)
Enterprise IAM Exposure
What changed: OIM/OIG acts as enterprise source of truth for user access and provisioning
Why it matters: Successful exploitation may compromise connected enterprise systems and credential stores (Lab Space)
HTTP Remote Attack Surface Exposure
What changed: Vulnerability exploitable remotely over HTTP with no authentication or user interaction
Why it matters: Public HTTP exposure significantly increases exploitation likelihood (Oracle)
Integration Trust Boundary Exposure
What changed: OWSM policies used across Fusion integrations may be impacted
Why it matters: Integration security failure can disrupt ERP ecosystem trust boundaries (Penligent)
SCIM Service Exposure
What changed: SCIM services reportedly enabled by default in some OIG deployments
Why it matters: Default-enabled HTTP endpoints increase attack surface significantly (Penligent)
Incident Response & Threat Monitoring
What changed: Oracle strongly recommends immediate application of fixes or mitigations
Why it matters: Similar prior OIM vulnerabilities were actively exploited and added to CISA KEV catalog (Tenable®)
Affected Supported Versions
What changed: Affected versions: 12.2.1.4.0 and 14.1.2.1.0 for both OIM and OWSM
Why it matters: Oracle warns unsupported earlier versions may also be affected (Oracle)
Aggregated Components & Validations
Deduplicated inventory of components impacted by the March 2026 Security Alert.
Affected Pages
13Affected APIs
14Recommended Test Cases
31March 2026 Security Alert FAQs
Common questions about CVE-2026-21992 and the Oracle Identity Manager emergency patch.
What is CVE-2026-21992?
Why did Oracle release this as an out-of-band alert?
Is CVE-2026-21992 being actively exploited?
Which Oracle systems are affected by March 2026 alert?
What should we do immediately?
How does this affect Oracle Cloud customers?
What is the relationship to CVE-2025-61757?
Don't Wait — Validate IAM Exposure Now
SyntraFlow auto-discovers Oracle Identity Manager and OWSM deployments across your estate, identifies CVE-2026-21992 exposure, and runs a targeted identity regression after patching.