Recent bundles
A similar vulnerability was introduced three times on three different code base (AIX, Solaris and GNU) in three different decades (1993, 2004 and 2014).
Related vulnerabilities: CVE-1999-0113CVE-2026-24061CVE-2007-0882
Security related changes:
The following CVEs were fixed in this release, details of which can be found in the advisories directory of the release tarball:
GLIBC-SA-2026-0001: Integer overflow in memalign leads to heap corruption (CVE-2026-0861)
GLIBC-SA-2026-0002: getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler (CVE-2026-0915)
GLIBC-SA-2026-0003: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory (CVE-2025-15281)
For more details: https://lists.gnu.org/archive/html/info-gnu/2026-01/msg00005.html
Related vulnerabilities: CVE-2025-15281CVE-2026-0861CVE-2026-0915
GitLab Patch Release: 18.8.2, 18.7.2, 18.6.4
Source: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
Learn more about GitLab Patch Release: 18.8.2, 18.7.2, 18.6.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).
Today, we are releasing versions 18.8.2, 18.7.2, 18.6.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).
These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.
GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases: scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays. For more information, please visit our releases handbook and security FAQ. You can see all of GitLab release blog posts here.
For security fixes, the issues detailing each vulnerability are made public on our issue tracker 30 days after the release in which they were patched.
We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. To maintain good security hygiene, it is highly recommended that all customers upgrade to the latest patch release for their supported version. You can read more best practices in securing your GitLab instance in our blog post.
Recommended Action
We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible.
When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.
Security fixes
Table of security fixes
| Title | Severity |
|---|---|
| Denial of Service issue in in Jira Connect integration impacts GitLab CE/EE | High |
| Incorrect Authorization issue in Releases API impacts GitLab CE/EE | High |
| Unchecked Return Value issue in authentication services impacts GitLab CE/EE | High |
| Infinite Loop issue in Wiki redirects impacts GitLab CE/EE | Medium |
| Denial of Service issue in API endpoint impacts GitLab CE/EE | Medium |
CVE-2025-13927 - Denial of Service issue in Jira Connect integration impacts GitLab CE/EE
GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by sending crafted requests with malformed authentication data.
Impacted Versions: GitLab CE/EE: all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2
CVSS 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Thanks a92847865 for reporting this vulnerability through our HackerOne bug bounty program.
CVE-2025-13928 - Incorrect Authorization issue in Releases API impacts GitLab CE/EE
GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrect authorization validation in API endpoints.
Impacted Versions: GitLab CE/EE: all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2
CVSS 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Thanks a92847865 for reporting this vulnerability through our HackerOne bug bounty program.
CVE-2026-0723 - Unchecked Return Value issue in authentication services impacts GitLab CE/EE
GitLab has remediated an issue that could have allowed an individual with existing knowledge of a victim's credential ID to bypass two-factor authentication by submitting forged device responses.
Impacted Versions: GitLab CE/EE: all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2
CVSS 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
Thanks ahacker1 for reporting this vulnerability through our HackerOne bug bounty program.
CVE-2025-13335 - Infinite Loop issue in Wiki redirects impacts GitLab CE/EE
GitLab has remediated an issue that under certain circumstances could have allowed an authenticated user to create a denial of service condition by configuring malformed Wiki documents that bypass cycle detection.
Impacted Versions: GitLab CE/EE: all versions from 17.1 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2
CVSS 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Thanks sim4n6 for reporting this vulnerability through our HackerOne bug bounty program.
CVE-2026-1102 - Denial of Service issue in API endpoint impacts GitLab CE/EE
GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by sending repeated malformed SSH authentication requests.
Impacted Versions: GitLab CE/EE: all versions from 12.3 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2
CVSS 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
This vulnerability has been discovered internally by GitLab team member Thiago Figueiró.
Bug fixes
18.8.2
- Backport of
Make external agent configurations GA - Backport Remove GitLab Dedicated support for semantic search until it's available
- Backport of '18.8.0: Merge Request reviewer dropdown crashes and does not send request'
- Backport of 'Pass user id to workflow service'
- Backport of rake task to seed AI Catalogs with external agents
- Backport of
Separate policy logic for AI Catalog Flows and Foundational Flows
18.7.2
- Backport of
Fix logic for fetching occurrences related to vulnerabilties - Backport of "Removes feature flag enablement for svc accounts"
- Backport of flaky import spec quarantine
- Backport 18.7 - Fix searchable dropdown race condition when typing fast
- Backport of
Recreate p_sent_notifications.reply_key index - Fix container_repositories index repair to handle 1-to-1 relationship
- [18.7] Fix migration health check endpoint
- Backport of 'Fix soft wrap not working due to accessibilitySupport conflict'
- Backport of 'Fix git push error for remote flows in self-managed instances'
- [Backport 18.7] Exclude Git LFS paths from Git HTTP throttling
- Backport of
Correct Code Review Flow history for beta - Backport of 'Fix Duo Chat button visibility for Amazon Q'
- Backport Allow user namespaces to be indexed in Zoekt for self-managed
- Backport of 'Disable Sidekiq retries for ClickHouse pipeline/build sync workers'
- Backport of 'Disable async_insert in build and pipeline sync operations'
- 18.7 - Remove manual from SLES-12.5-release-pulp job
18.6.4
- Backport of "Removes feature flag enablement for svc accounts"
- Backport of flaky import spec quarantine
- Backport 18.6 - Fix searchable dropdown race condition when typing fast
- Fix container_repositories index repair to handle 1-to-1 relationship
- Backport of 'Fix soft wrap not working due to accessibilitySupport conflict'
- Backport of 'Fix git push error for remote flows in self-managed instances'
- [Backport 18.6] Exclude Git LFS paths from Git HTTP throttling
- Backport-Allow user namespaces to be indexed in Zoekt for self-managed
- Backport of 'Disable Sidekiq retries for ClickHouse pipeline/build sync workers'
- Backport of 'Disable async_insert in build and pipeline sync operations'
- 18.6 - Remove manual from SLES-12.5-release-pulp job
- Start Pulp FIPS jobs after PC FIPS jobs - 18.6
- [CI] Fix the builder image tags for the check-packages jobs 18-6
Important notes on upgrading
This patch includes database migrations that may impact your upgrade process.
Impact on your installation:
- Single-node instances: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.
- Multi-node instances: With proper zero-downtime upgrade procedures, this patch can be applied without downtime.
Post-deploy migrations
The following versions include post-deploy migrations that can run after the upgrade:
- 18.7.2
To learn more about the impact of upgrades on your installation, see:
- Zero-downtime upgrades for multi-node deployments
- Standard upgrades for single-node installations
Updating
To update GitLab, see the Update page. To update GitLab Runner, see the Updating the Runner page.
Receive Patch Notifications
To receive patch blog notifications delivered to your inbox, visit our contact us page. To receive release notifications via RSS, subscribe to our patch release RSS feed or our RSS feed for all releases.
Related vulnerabilities: CVE-2025-13927CVE-2025-13335CVE-2026-0723CVE-2026-1102CVE-2025-13928
Oracle Critical Patch Update Advisory - January 2026
Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to “Critical Patch Updates, Security Alerts and Bulletins” for information about Oracle Security advisories.
Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.
This Critical Patch Update contains 337 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at January 2026 Critical Patch Update: Executive Summary and Analysis.
Affected Products and Patch Information
Security vulnerabilities addressed by this Critical Patch Update affect the products listed below.
Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.
- Affected Products and Versions: JD Edwards EnterpriseOne Tools, versions 9.2.0.0-9.2.26.0
- Patch Availability Document: JD Edwards
- Affected Products and Versions: MySQL Cluster, versions 7.6.0-7.6.36, 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Connectors, versions 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Enterprise Backup, versions 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Server, versions 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- Patch Availability Document: MySQL
- Affected Products and Versions: MySQL Workbench, versions 8.0.0-8.0.45
- Patch Availability Document: MySQL
- Affected Products and Versions: Oracle Access Manager, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Agile PLM, version 9.3.6
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle Agile Product Lifecycle Management for Process, version 6.2.4
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle APEX Sample Applications, versions 23.2.0, 23.2.1, 24.1.0, 24.2.0, 24.2.1
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Application Testing Suite, version 13.3.0.1
- Patch Availability Document: Oracle Enterprise Manager
- Affected Products and Versions: Oracle Autovue for Agile Product Lifecycle Management, version 21.1.0
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle AutoVue Office, version 21.1.0
- Patch Availability Document: Oracle Supply Chain Products
- Affected Products and Versions: Oracle Banking Branch, versions 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Cash Management, versions 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Corporate Lending Process Management, versions 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Liquidity Management, versions 14.5.0.14.0, 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Banking Supply Chain Finance, versions 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle BI Publisher, versions 7.6.0.0.0, 8.2.0.0.0
- Patch Availability Document: Oracle Analytics
- Affected Products and Versions: Oracle Business Intelligence Enterprise Edition, versions 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- Patch Availability Document: Oracle Analytics
- Affected Products and Versions: Oracle Business Process Management Suite, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Cloud Native Session Border Controller, version 25.1.0
- Patch Availability Document: Oracle Cloud Native Session Border Controller
- Affected Products and Versions: Oracle Coherence, versions 12.2.1.4.0, 14.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Commerce Guided Search, version 11.4.0
- Patch Availability Document: Oracle Commerce
- Affected Products and Versions: Oracle Commerce Platform, version 11.4.0
- Patch Availability Document: Oracle Commerce
- Affected Products and Versions: Oracle Communications ASAP, versions 7.4.0, 7.4.1
- Patch Availability Document: Oracle Communications ASAP
- Affected Products and Versions: Oracle Communications Billing and Revenue Management, versions 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- Patch Availability Document: Oracle Communications Billing and Revenue Management
- Affected Products and Versions: Oracle Communications BRM - Elastic Charging Engine, versions 15.0.0.0, 15.0.1.0, 15.1.0.0
- Patch Availability Document: Oracle Communications BRM - Elastic Charging Engine
- Affected Products and Versions: Oracle Communications Diameter Signaling Router, versions 9.0.0, 9.0.1, 9.1.0
- Patch Availability Document: Oracle Communications Diameter Signaling Router
- Affected Products and Versions: Oracle Communications Element Manager, versions 9.0.0-9.0.4
- Patch Availability Document: Oracle Communications Element Manager
- Affected Products and Versions: Oracle Communications IP Service Activator, version 7.5.0
- Patch Availability Document: Oracle Communications IP Service Activator
- Affected Products and Versions: Oracle Communications Network Analytics Data Director, versions 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- Patch Availability Document: Oracle Communications Network Analytics Data Director
- Affected Products and Versions: Oracle Communications Network Integrity, versions 7.3.6, 7.4.0, 7.5.0, 8.0.0
- Patch Availability Document: Oracle Communications Network Integrity
- Affected Products and Versions: Oracle Communications Operations Monitor, versions 5.2, 6.0, 6.1
- Patch Availability Document: Oracle Communications Operations Monitor
- Affected Products and Versions: Oracle Communications Order and Service Management, versions 7.5.0, 8.0.0
- Patch Availability Document: Oracle Communications Order and Service Management
- Affected Products and Versions: Oracle Communications Policy Management, version 15.0.0.0
- Patch Availability Document: Oracle Communications Policy Management
- Affected Products and Versions: Oracle Communications Pricing Design Center, versions 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- Patch Availability Document: Oracle Communications Pricing Design Center
- Affected Products and Versions: Oracle Communications Session Border Controller, versions 9.3.0, 10.0.0
- Patch Availability Document: Oracle Communications Session Border Controller
- Affected Products and Versions: Oracle Communications Session Report Manager, versions 9.0.0-9.0.4
- Patch Availability Document: Oracle Communications Session Report Manager
- Affected Products and Versions: Oracle Communications Unified Assurance, versions 6.1.0-6.1.1
- Patch Availability Document: Oracle Communications Unified Assurance
- Affected Products and Versions: Oracle Communications Unified Inventory Management, versions 7.7.0, 7.8.0, 8.0.0
- Patch Availability Document: Oracle Communications Unified Inventory Management
- Affected Products and Versions: Oracle Data Integrator, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Database Server, versions 19.3-19.29, 21.3-21.20, 23.4.0-23.26.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle E-Business Suite, versions 12.2.3-12.2.15
- Patch Availability Document: Oracle E-Business Suite
- Affected Products and Versions: Oracle Enterprise Communications Broker, versions 4.1.0, 4.2.0, 5.0.0
- Patch Availability Document: Oracle Enterprise Communications Broker
- Affected Products and Versions: Oracle Enterprise Manager Base Platform, versions 13.5, 24.1
- Patch Availability Document: Oracle Enterprise Manager
- Affected Products and Versions: Oracle Essbase, version 21.8.0.0.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Financial Services Compliance Studio, version 2.6.0
- Patch Availability Document: Oracle Financial Services Compliance Studio
- Affected Products and Versions: Oracle Financial Services Model Management and Governance, version 8.1.3.2
- Patch Availability Document: Oracle Financial Services Model Management and Governance
- Affected Products and Versions: Oracle FLEXCUBE Investor Servicing, versions 14.5.0.15.0, 14.7.0.8.0, 14.8.0.1.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle FLEXCUBE Universal Banking, versions 14.0.0.0.0-14.8.0.0.0
- Patch Availability Document: Contact Support
- Affected Products and Versions: Oracle Fusion Middleware, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Global Lifecycle Management NextGen OUI Framework, version 15.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle GoldenGate, versions 19.1.0.0.0-19.29.0.0.251021, 21.3-21.20, 23.4-23.10
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Big Data and Application Adapters, versions 19.1.0.0.0-19.1.0.0.20, 21.3-21.20, 23.4-23.10
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Stream Analytics, versions 19.1.0.0.0-19.1.0.0.13
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Studio, versions 23.8.0-23.9.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GoldenGate Veridata, versions 12.2.1.4.0-12.2.1.4.250531
- Patch Availability Document: Database
- Affected Products and Versions: Oracle GraalVM Enterprise Edition, version 21.3.16
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle GraalVM for JDK, versions 17.0.17, 21.0.9
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle Graph Server and Client, versions 24.4.4, 25.4.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Health Sciences Information Manager, version 4.0.0
- Patch Availability Document: HealthCare Applications
- Affected Products and Versions: Oracle Healthcare Data Repository, versions 8.2.0.5, 8.2.0.6
- Patch Availability Document: HealthCare Applications
- Affected Products and Versions: Oracle Healthcare Master Person Index, versions 5.0.0.0-5.0.9.5
- Patch Availability Document: HealthCare Applications
- Affected Products and Versions: Oracle Hospitality OPERA 5 Property Services, versions 5.6.19, 5.6.25, 5.6.26, 5.6.27
- Patch Availability Document: Oracle Hospitality OPERA 5 Property Services
- Affected Products and Versions: Oracle HTTP Server, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Hyperion Calculation Manager, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Financial Close Management, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Financial Management, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Financial Reporting, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Infrastructure Technology, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Planning, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Hyperion Profitability and Cost Management, version 11.2.23
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Identity Manager, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Identity Manager Connector, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Insurance Policy Administration J2EE, versions 11.3.1-12.0.6
- Patch Availability Document: Oracle Insurance Applications
- Affected Products and Versions: Oracle Java SE, versions 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle JDK Mission Control, version 9.1.1
- Patch Availability Document: Java SE
- Affected Products and Versions: Oracle Key Vault, versions 21.1.0.0.0-21.11.0.0.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Life Sciences Central Coding, version 7.0.1.0
- Patch Availability Document: Health Sciences
- Affected Products and Versions: Oracle Life Sciences Central Designer, version 7.0.1.0
- Patch Availability Document: Health Sciences
- Affected Products and Versions: Oracle Managed File Transfer, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Middleware Common Libraries and Tools, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle NoSQL Database, versions 1.5, 1.6
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Outside In Technology, versions 8.5.7, 8.5.8
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Planning and Budgeting Cloud Service, version 25.4.7
- Patch Availability Document: Oracle Enterprise Performance Management
- Affected Products and Versions: Oracle Retail Advanced Inventory Planning, versions 15.0.3, 16.0.3
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Allocation, versions 15.0.3, 16.0.3
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Bulk Data Integration, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Financial Integration, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Fiscal Management, version 14.2
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Integration Bus, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Predictive Application Server, versions 15.0.3, 16.0.3
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Service Backbone, versions 16.0.3, 19.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Xstore Office, version 25.0.1
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Retail Xstore Point of Service, versions 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0
- Patch Availability Document: Retail Applications
- Affected Products and Versions: Oracle Secure Backup, versions 19.1.0.0.0-19.1.0.1.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Security Service, version 12.2.1.4.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Service Bus, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle SOA Suite, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Solaris, versions 10, 11
- Patch Availability Document: Systems
- Affected Products and Versions: Oracle TimesTen In-Memory Database, versions 22.1.1.1.0-22.1.1.35.0
- Patch Availability Document: Database
- Affected Products and Versions: Oracle Unified Directory, versions 12.2.1.4.0, 14.1.2.1.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Utilities Application Framework, versions 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
- Patch Availability Document: Oracle Utilities Applications
- Affected Products and Versions: Oracle Utilities Network Management System, versions 2.5.0.1.16, 2.5.0.2.10, 2.6.0.1.9, 2.6.0.2.5
- Patch Availability Document: Oracle Utilities Applications
- Affected Products and Versions: Oracle Utilities Testing Accelerator, versions 7.0.0.0.6, 7.0.0.1.4, 25.4.0.0.1
- Patch Availability Document: Oracle Utilities Applications
- Affected Products and Versions: Oracle VM VirtualBox, versions 7.1.14, 7.2.4
- Patch Availability Document: Virtualization
- Affected Products and Versions: Oracle WebCenter Enterprise Capture, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle WebCenter Sites, versions 12.2.1.4.0, 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle WebLogic Server, versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Weblogic Server Proxy Plug-in, versions 12.2.1.4.0, 14.1.1.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Oracle Zero Data Loss Recovery Appliance Software, versions 23.1.0-23.1.202509
- Patch Availability Document: Database
- Affected Products and Versions: Oracle ZFS Storage Appliance Kit, version 8.8
- Patch Availability Document: Systems
- Affected Products and Versions: PeopleSoft Enterprise HCM Human Resources, version 9.2
- Patch Availability Document: PeopleSoft
- Affected Products and Versions: PeopleSoft Enterprise PeopleTools, versions 8.60, 8.61, 8.62
- Patch Availability Document: PeopleSoft
- Affected Products and Versions: PeopleSoft Enterprise SCM Purchasing, version 9.2
- Patch Availability Document: PeopleSoft
- Affected Products and Versions: Primavera Gateway, versions 21.12.0-21.12.16
- Patch Availability Document: Oracle Construction and Engineering Suite
- Affected Products and Versions: Primavera P6 Enterprise Project Portfolio Management, versions 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0
- Patch Availability Document: Oracle Construction and Engineering Suite
- Affected Products and Versions: Primavera Unifier, versions 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- Patch Availability Document: Oracle Construction and Engineering Suite
- Affected Products and Versions: Service Delivery Platform, version 14.1.2.0.0
- Patch Availability Document: Fusion Middleware
- Affected Products and Versions: Siebel Applications, versions 17.0-25.11
- Patch Availability Document: Siebel
Risk Matrix Content
Risk matrices list only security vulnerabilities that are newly addressed by the patches associated with this advisory. Risk matrices for previous security patches can be found in previous Critical Patch Update advisories and Alerts. An English text version of the risk matrices provided in this document is here.
Several vulnerabilities addressed in this Critical Patch Update affect multiple products. Each vulnerability is identified by a CVE ID. A vulnerability that affects multiple products will appear with the same CVE ID in all risk matrices.
Security vulnerabilities are scored using CVSS version 3.1 (see Oracle CVSS Scoring for an explanation of how Oracle applies CVSS version 3.1).
Oracle conducts an analysis of each security vulnerability addressed by a Critical Patch Update. Oracle does not disclose detailed information about this security analysis to customers, but the resulting Risk Matrix and associated documentation provide information about conditions required to exploit the vulnerability and the potential impact of a successful exploit. Oracle provides this information so that customers may conduct their own risk analysis based on the particulars of their product usage. For more information, see Oracle vulnerability disclosure policies.
Third party component vulnerabilities that are deemed not exploitable in the context of their inclusion in an Oracle product are listed, with VEX justifications, below the respective Oracle product's risk matrix.
The protocol in the risk matrix implies that all of its secure variants are affected as well. For example, if HTTP is listed as an affected protocol, it implies that HTTPS is also affected. The secure variant of a protocol is listed in the risk matrix only if it is the only variant affected.
Workarounds
Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible. Until you apply the Critical Patch Update patches, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from users that do not need the privileges may help reduce the risk of successful attack. Both approaches may break application functionality, so Oracle strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Skipped Critical Patch Updates
Oracle strongly recommends that customers apply security patches as soon as possible. For customers that have skipped one or more Critical Patch Updates and are concerned about products that do not have security patches announced in this Critical Patch Update, please review previous Critical Patch Update advisories to determine appropriate actions.
Critical Patch Update Supported Products and Versions
Patches released through the Critical Patch Update program are provided only for product versions that are covered under the Premier Support or Extended Support phases of the Lifetime Support Policy. Oracle recommends that customers plan product upgrades to ensure that patches released through the Critical Patch Update program are available for the versions they are currently running.
Product releases that are not under Premier Support or Extended Support are not tested for the presence of vulnerabilities addressed by this Critical Patch Update. However, it is likely that earlier versions of affected releases are also affected by these vulnerabilities. As a result, Oracle recommends that customers upgrade to supported versions.
Database, Fusion Middleware, and Oracle Enterprise Manager products are patched in accordance with the Software Error Correction Support Policy that further supplements the Lifetime Support Policy as explained in My Oracle Support Note KB65129. Please review the Technical Support Policies for further guidelines regarding support policies and phases of support.
Credit Statement
The following people or organizations reported security vulnerabilities addressed by this Critical Patch Update to Oracle:
- Akira Hachiya: CVE-2026-21939
- Alexander Kornbrust of Red Database Security: CVE-2026-21958, CVE-2026-21977
- Anton Fedorov: CVE-2026-21968
- Ao Wang of Southeast University: CVE-2026-21928, CVE-2026-21982
- Eangly Roeurn: CVE-2026-21978
- fstmpr: CVE-2026-21989, CVE-2026-21990
- haidv35 (Dinh Viet Hai) of Viettel Cyber Security: CVE-2026-21944
- Ireneusz Pastusiak: CVE-2026-21945
- Jingzhou Fu of WingTecher Lab of Tsinghua University: CVE-2026-21949, CVE-2026-21950
- Kanika Jalal: CVE-2026-21931
- Kritnarong Samertung: CVE-2026-21973
- Kush Jijania: CVE-2026-21924
- Maxime Escourbiac of Michelin CERT: CVE-2026-21959, CVE-2026-21960
- Mingijung of WebSec Lab: CVE-2026-21932
- Mohammed Ba Rashed: CVE-2026-21986
- Muhammad Zeeshan (Xib3rR4dAr): CVE-2026-21943
- NiNi (terrynini38514) from DEVCORE Research Team working with Trend Micro Zero Day Initiative: CVE-2026-21957
- Patrick Murphy of Lockheed Martin Red Team: CVE-2026-21922, CVE-2026-21979
- Phudq of Viettel Cybersecurity working with Trend Zero Day Initiative: CVE-2026-21985
- PwC HK Darklab: CVE-2026-21966, CVE-2026-21967
- Ryan Brothers: CVE-2026-21948
- Ved Prabhu: CVE-2026-21931
- Viettel Cyber Security working with Trend Micro Zero Day Initiative: CVE-2026-21963
- VMBreakers (Gangmin Kim, Sangbin Kim, Un3xploitable) working with Trend Micro Zero Day Initiative: CVE-2026-21955, CVE-2026-21956, CVE-2026-21984
- Xiaobye (xiaobye_tw) of DEVCORE Research Team working with Trend Micro Zero Day Initiative: CVE-2026-21983
- Yassine Bengana of Michelin CERT: CVE-2026-21959, CVE-2026-21960
- Yuhao Jiang: CVE-2026-21981
- Zhenghao Li of ISCAS: CVE-2026-21987, CVE-2026-21988
- Zhihui Chen: CVE-2026-21933
- Zhiyong Wu of WingTecher Lab of Tsinghua University: CVE-2026-21949, CVE-2026-21950
- Zpt_dxpn of Pentest Team Viettel Cyber Security: CVE-2026-21969
Security-In-Depth Contributors
Oracle acknowledges people who have contributed to our Security-In-Depth program (see FAQ). People are acknowledged for Security-In-Depth contributions if they provide information, observations or suggestions pertaining to security vulnerability issues that result in significant modification of Oracle code or documentation in future releases, but are not of such a critical nature that they are distributed in Critical Patch Updates.
In this Critical Patch Update, Oracle recognizes the following for contributions to Oracle's Security-In-Depth program:
- Akira Hachiya
- Jan Starke
- Karan Bamal
On-Line Presence Security Contributors
Oracle acknowledges people who have contributed to our On-Line Presence Security program (see FAQ). People are acknowledged for contributions relating to Oracle's on-line presence if they provide information, observations or suggestions pertaining to security-related issues that result in significant modification to Oracle's on-line external-facing systems.
For this quarter, Oracle recognizes the following for contributions to Oracle's On-Line Presence Security program:
- Abdulhadi Arif Alshammari
- Ammar Albarakati
- Avanish Pathak
- Ayşenur Demiral
- Bryon Wolcott
- Emad Al-Mousa of Saudi Aramco's Upstream Digital Center (UDC) [2 reports]
- Garreth Kelsey
- Gouri Sankar A
- Jiehao Zhang (Water1sec)
- Keisuke Inoue of LAC Co., Ltd.
- Kristen Duchrow
- Mike Khytko of Alerts Bar Inc
- Pherry874
- Reiji Nishimura of LAC Co., Ltd.
- Richard Fichtner
- Surya Arigela
- Yosuke Totani of LAC Co., Ltd
Critical Patch Update Schedule
Critical Patch Updates are released on the third Tuesday of January, April, July, and October. The next four dates are:
- 21 April 2026
- 21 July 2026
- 20 October 2026
- 19 January 2027
References
- Oracle Critical Patch Updates, Security Alerts and Bulletins
- Critical Patch Update - January 2026 Documentation Map
- Oracle Critical Patch Updates and Security Alerts - Frequently Asked Questions
- Risk Matrix Definitions
- Use of Common Vulnerability Scoring System (CVSS) by Oracle
- English text version of the risk matrices
- CSAF JSON version of the risk matrices
- Map of CVE to Advisory/Alert
- Oracle Lifetime support Policy
- JEP 290 Reference Blocklist Filter
Modification History
| Date | Note |
|---|---|
| 2026-January-20 | Rev 1. Initial Release. |
Oracle Database Products Risk Matrices
This Critical Patch Update contains 18 new security patches for Oracle Database Products divided as follows:
- 7 new security patches for Oracle Database Products
- 1 new security patch for Oracle APEX
- 1 new security patch for Oracle Essbase
- 5 new security patches for Oracle GoldenGate
- 1 new security patch for Oracle Graph Server and Client
- No new security patches for Oracle Key Vault, but third party patches are provided
- 1 new security patch for Oracle NoSQL Database
- 1 new security patch for Oracle Secure Backup
- No new security patches for Oracle TimesTen In-Memory Database, but third party patches are provided
- 1 new security patch for Oracle Zero Data Loss Recovery Appliance
Oracle Database Server Risk Matrix
This Critical Patch Update contains 7 new security patches, plus additional third party patches noted below, for Oracle Database Products. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. 1 of these patches is applicable to client-only installations, i.e., installations that do not have the Oracle Database Server installed. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Component: AttackVector
- Package and/or Privilege Required: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-12383
- Component: Fleet Patching and Provisioning (Eclipse Jersey)
- Package and/or Privilege Required: None
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 23.4.0-23.26.0
- CVE ID: CVE-2026-21939
- Component: SQLcl
- Package and/or Privilege Required: None
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.0
- Supported Versions Affected: Local
- Notes: High
- None
- Required
- Un-changed
- High
- High
- High
- 23.4.0-23.26.0
- CVE ID: CVE-2025-8194
- Component: RDBMS (Python)
- Package and/or Privilege Required: Authenticated User
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.7
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Un-changed
- High
- High
- High
- 21.3-21.20, 23.4.0-23.26.0
- CVE ID: CVE-2025-67735
- Component: Oracle Graal Development Kit for Micronaut (Nimbus JOSE+JWT)
- Package and/or Privilege Required: Authenticated User
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 19.3-19.29, 23.4.0-23.26.0
- CVE ID: CVE-2026-21975
- Component: Java VM
- Package and/or Privilege Required: Authenticated User
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.5
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- High
- 19.3-19.29, 21.3-21.20
- CVE ID: CVE-2025-61755
- Component: GraalVM Multilingual Engine
- Package and/or Privilege Required: Create Session
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- Low
- None
- None
- 21.3-21.20, 23.4.0-23.26.0
- CVE ID: CVE-2025-54874
- Component: Oracle Spatial and Graph (OpenJPEG)
- Package and/or Privilege Required: None
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- Required
- Un-changed
- None
- None
- Low
- 23.4.0-23.26.0
Additional CVEs addressed are:
- The patch for CVE-2025-8194 also addresses CVE-2025-13836, CVE-2025-13837, CVE-2025-6069, CVE-2025-6075, CVE-2025-8291, and CVE-2025-8869.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle Database (Apache Tomcat): CVE-2025-61795 and CVE-2025-55754 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle Database Security (OpenSSL): CVE-2025-9230, CVE-2025-9231 and CVE-2025-9232 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Database Server Client-Only Installations
- The following Oracle Database Server vulnerability included in this Critical Patch Update affects client-only installations: CVE-2026-21939.
Oracle APEX Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle APEX. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21931
- Product: Oracle APEX Sample Applications
- Component: Brookstrut Sample App
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- Required
- Changed
- Low
- Low
- None
- 23.2.0, 23.2.1, 24.1.0, 24.2.0, 24.2.1
Oracle Essbase Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Essbase. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66566
- Product: Oracle Essbase
- Component: Essbase Web Platform (lz4-java)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 21.8.0.0.0
Oracle GoldenGate Risk Matrix
This Critical Patch Update contains 5 new security patches, plus additional third party patches noted below, for Oracle GoldenGate. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-59250
- Product: Oracle GoldenGate Big Data and Application Adapters
- Component: Java Delivery (JDBC Driver for SQL Server)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- High
- High
- None
- 21.3-21.20, 23.4-23.10
- CVE ID: CVE-2025-59419
- Product: Oracle GoldenGate Big Data and Application Adapters
- Component: Java Delivery (Netty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 21.3-21.20, 23.4-23.10
- CVE ID: CVE-2025-55039
- Product: Oracle GoldenGate Stream Analytics
- Component: General (Apache Spark)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 19.1.0.0.0-19.1.0.0.11
- CVE ID: CVE-2025-68161
- Product: Oracle GoldenGate Big Data and Application Adapters
- Component: Third Party (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 19.1.0.0.0-19.1.0.0.20, 21.3-21.20, 23.4-23.10
- CVE ID: CVE-2025-48924
- Product: Oracle GoldenGate Stream Analytics
- Component: General (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- Low
- 19.1.0.0.0-19.1.0.0.11
Additional CVEs addressed are:
- The patch for CVE-2025-59419 also addresses CVE-2025-58056 and CVE-2025-58057.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle GoldenGate
- Embedded Web UI for Services (Axios): CVE-2025-58754 and CVE-2025-27152 [VEX Justification: vulnerable_code_not_in_execute_path].
- Libraries (BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Big Data and Application Adapters
- Java Delivery (Apache Commons IO): CVE-2024-47554 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Stream Analytics
- General (urllib3): CVE-2025-66418 and CVE-2025-66471 [VEX Justification: vulnerable_code_not_in_execute_path].
- General (Requests): CVE-2024-35195 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Studio
- OGG Orchestration Service (Apache Commons BeanUtils): CVE-2025-48734 [VEX Justification: vulnerable_code_not_in_execute_path].
- OGG Orchestration Service (logback): CVE-2023-6378 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle GoldenGate Veridata
- Third Party (Apache Commons FileUpload): CVE-2025-48976 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Graph Server and Client Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Graph Server and Client. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-61795
- Product: Oracle Graph Server and Client
- Component: Packaging (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 24.4.4, 25.4.0
Oracle Key Vault Risk Matrix
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle Key Vault. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle Key Vault. The English text form of this Risk Matrix can be found here.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle Key Vault
- General Server/Appliance: CVE-2026-21958 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
Oracle NoSQL Database Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle NoSQL Database. This vulnerability is not remotely exploitable without authentication, i.e., may not be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-30065
- Product: Oracle NoSQL Database
- Component: Administration (Apache Parquet Java)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.0
- Supported Versions Affected: Local
- Notes: High
- Low
- None
- Un-changed
- High
- High
- High
- 1.5, 1.6
Oracle Secure Backup Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Secure Backup. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-65082
- Product: Oracle Secure Backup
- Component: Oracle Secure Backup (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 19.1.0.0.0-19.1.0.1.0
Additional CVEs addressed are:
- The patch for CVE-2025-65082 also addresses CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, and CVE-2025-66200.
Oracle TimesTen In-Memory Database Risk Matrix
This Critical Patch Update contains no new security patches for exploitable vulnerabilities but does include third party patches, noted below, for the following non-exploitable third party CVEs for Oracle TimesTen In-Memory Database. Please refer to previous Critical Patch Update Advisories if the last Critical Patch Update was not applied for Oracle TimesTen In-Memory Database. The English text form of this Risk Matrix can be found here.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle TimesTen In-Memory Database
- Kubernetes Operator (Golang Go): CVE-2025-47910 [VEX Justification: vulnerable_code_not_in_execute_path].
- Install (BSAFE Crypto-J): CVE-2025-26333 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Zero Data Loss Recovery Appliance Risk Matrix
This Critical Patch Update contains 1 new security patch for Oracle Zero Data Loss Recovery Appliance. This vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21977
- Product: Oracle Zero Data Loss Recovery Appliance Software
- Component: Security
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- Low
- None
- None
- 23.1.0-23.1.202509
Oracle Commerce Risk Matrix
This Critical Patch Update contains 7 new security patches for Oracle Commerce. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: Oracle Commerce Guided Search
- Component: Workbench (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 11.4.0
- CVE ID: CVE-2025-50059
- Product: Oracle Commerce Guided Search
- Component: Content Acquisition System, Workbench, Endeca Application Controller (Oracle Java SE)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- None
- None
- 11.4.0
- CVE ID: CVE-2025-41249
- Product: Oracle Commerce Guided Search
- Component: Content Acquisition System, Workbench, Endeca Application Controller (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 11.4.0
- CVE ID: CVE-2025-9086
- Product: Oracle Commerce Guided Search
- Component: MDEX, Forge (curl)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 11.4.0
- CVE ID: CVE-2025-41249
- Product: Oracle Commerce Platform
- Component: Dynamo Application Framework (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 11.4.0
- CVE ID: CVE-2025-61795
- Product: Oracle Commerce Guided Search
- Component: Content Acquisition System, Workbench, Endeca Application Controller (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 11.4.0
- CVE ID: CVE-2025-48924
- Product: Oracle Commerce Platform
- Component: Dynamo Application Framework (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.4.0
Additional CVEs addressed are:
- The patch for CVE-2025-41249 also addresses CVE-2025-41242.
- The patch for CVE-2025-9086 also addresses CVE-2025-10148.
Oracle Communications Risk Matrix
This Critical Patch Update contains 56 new security patches for Oracle Communications. 34 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: Oracle Communications Order and Service Management
- Component: Security (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 7.5.0, 8.0.0
- CVE ID: CVE-2025-49844
- Product: Oracle Communications Operations Monitor
- Component: Infrastructure (valkey)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.9
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Changed
- High
- High
- High
- 5.2
- CVE ID: CVE-2025-48734
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 15.0.0.0
- CVE ID: CVE-2025-9900
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (LibTIFF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- High
- High
- High
- 15.0.0.0
- CVE ID: CVE-2025-66516
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Changed
- High
- High
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-32990
- Product: Oracle Communications Network Analytics Data Director
- Component: Platform (GnuTLS)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- High
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200
- CVE ID: CVE-2025-32990
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (GnuTLS)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- High
- 15.0.0.0
- CVE ID: CVE-2025-5987
- Product: Oracle Enterprise Communications Broker
- Component: Routing (libssh)
- Protocol: SSH
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 4.2.0, 5.0.0
- CVE ID: CVE-2025-58057
- Product: Oracle Cloud Native Session Border Controller
- Component: Security (Netty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 25.1.0
- CVE ID: CVE-2025-48060
- Product: Oracle Cloud Native Session Border Controller
- Component: Third Party (jq)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 25.1.0
- CVE ID: CVE-2025-41249
- Product: Oracle Communications BRM - Elastic Charging Engine
- Component: Security (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 15.1.0.0
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Diameter Signaling Router
- Component: Automated Test Suite (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0, 9.0.1, 9.1.0
- CVE ID: CVE-2025-27533
- Product: Oracle Communications Element Manager
- Component: Third Party (Apache ActiveMQ)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-48976
- Product: Oracle Communications Element Manager
- Component: Third Party (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-59375
- Product: Oracle Communications Network Analytics Data Director
- Component: Third Party (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- CVE ID: CVE-2025-41249
- Product: Oracle Communications Network Integrity
- Component: Platform, MSS Cartridge (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 7.3.6, 7.4.0, 7.5.0
- CVE ID: CVE-2025-66418
- Product: Oracle Communications Operations Monitor
- Component: Mediation Engine (urllib3)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 5.2, 6.0, 6.1
- CVE ID: CVE-2025-48976
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 15.0.0.0
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Session Border Controller
- Component: Routing (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.3.0, 10.0.0
- CVE ID: CVE-2025-27533
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache ActiveMQ)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-48976
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-46727
- Product: Oracle Communications Unified Assurance
- Component: Core (Rack)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Unified Inventory Management
- Component: Security (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.7.0, 7.8.0, 8.0.0
- CVE ID: CVE-2025-66418
- Product: Oracle Communications Unified Inventory Management
- Component: Security (urllib3)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.7.0, 7.8.0, 8.0.0
- CVE ID: CVE-2025-8194
- Product: Oracle Enterprise Communications Broker
- Component: Routing (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 4.1.0, 4.2.0, 5.0.0
- CVE ID: CVE-2025-32988
- Product: Oracle Cloud Native Session Border Controller
- Component: Third Party (GnuTLS)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- Low
- High
- 25.1.0
- CVE ID: CVE-2025-58098
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- High
- High
- Low
- 6.1.0-6.1.1
- CVE ID: CVE-2025-54571
- Product: Oracle Communications Unified Assurance
- Component: Core (ModSecurity)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-26333
- Product: Oracle Communications Billing and Revenue Management
- Component: Platform (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- CVE ID: CVE-2025-65018
- Product: Oracle Communications Unified Assurance
- Component: Core (libpng)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- None
- High
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-25193
- Product: Oracle Communications BRM - Elastic Charging Engine
- Component: Security (Netty)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.5
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 15.0.0.0, 15.0.1.0
- CVE ID: CVE-2025-68161
- Product: Oracle Communications IP Service Activator
- Component: Logging (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 7.5.0
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Network Analytics Data Director
- Component: Security (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 15.0.0.0
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Pricing Design Center
- Component: On-premise Deployment (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 15.0.0.0.0, 15.0.1.0.0, 15.1.0.0.0
- CVE ID: CVE-2025-5318
- Product: Oracle Communications Unified Assurance
- Component: Core (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-48924
- Product: Oracle Cloud Native Session Border Controller
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 25.1.0
- CVE ID: CVE-2025-48924
- Product: Oracle Communications ASAP
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.4.0, 7.4.1
- CVE ID: CVE-2025-48924
- Product: Oracle Communications Element Manager
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 9.0.0-9.0.4
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Element Manager
- Component: Web UI (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2025-48924
- Product: Oracle Communications IP Service Activator
- Component: System (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.5.0
- CVE ID: CVE-2025-48924
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 15.0.0.0
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Policy Management
- Component: Configuration Management Platform (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 15.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 9.0.0-9.0.4
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Session Report Manager
- Component: Third Party (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.0.4
- CVE ID: CVE-2024-12133
- Product: Oracle Communications Unified Assurance
- Component: Core (Libtasn1)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 6.1.0-6.1.1
- CVE ID: CVE-2025-5115
- Product: Oracle Communications Unified Assurance
- Component: Core (Eclipse Jetty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-55163
- Product: Oracle Communications Unified Assurance
- Component: Core (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- High
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-68161
- Product: Oracle Communications Network Integrity
- Component: Logging (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.8
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- None
- 7.3.6, 7.4.0, 7.5.0, 8.0.0
- CVE ID: CVE-2025-59375
- Product: Oracle Communications Unified Assurance
- Component: Core (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.5
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-8194
- Product: Oracle Communications Unified Assurance
- Component: Core (Python)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.5
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2024-46901
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache Subversion)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- Low
- 6.1.0-6.1.1
- CVE ID: CVE-2025-61795
- Product: Oracle Communications Unified Assurance
- Component: Core (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.2
- Supported Versions Affected: Network
- Notes: High
- High
- Required
- Un-changed
- None
- None
- High
- 6.1.0-6.1.1
- CVE ID: CVE-2025-55163
- Product: Oracle Communications Network Analytics Data Director
- Component: Security (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- Low
- 24.2.0-24.2.1, 24.3.0, 25.1.100, 25.1.200, 25.2.100
- CVE ID: CVE-2025-64718
- Product: Oracle Communications Unified Assurance
- Component: Core (node-forge)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- Low
- None
- 6.1.0-6.1.1
- CVE ID: CVE-2025-8916
- Product: Oracle Communications Unified Assurance
- Component: Core (Bouncy Castle Java Library)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.4
- Supported Versions Affected: Network
- Notes: Low
- High
- Required
- Un-changed
- None
- None
- Low
- 6.1.0-6.1.1
Additional CVEs addressed are:
- The patch for CVE-2025-64718 also addresses CVE-2025-12816.
- The patch for CVE-2025-48060 also addresses CVE-2024-23337.
- The patch for CVE-2025-66418 also addresses CVE-2025-66471.
- The patch for CVE-2024-46901 also addresses CVE-2024-45720.
- The patch for CVE-2025-9900 also addresses CVE-2025-8176, CVE-2025-8177, and CVE-2025-8961.
- The patch for CVE-2025-5318 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, CVE-2025-5449, and CVE-2025-5987.
- The patch for CVE-2025-32990 also addresses CVE-2025-32988, CVE-2025-32989, CVE-2025-5318, and CVE-2025-6395.
- The patch for CVE-2025-41249 also addresses CVE-2025-22233, CVE-2025-41234, and CVE-2025-41242.
- The patch for CVE-2025-65018 also addresses CVE-2025-64505, CVE-2025-64506, and CVE-2025-64720.
- The patch for CVE-2025-58098 also addresses CVE-2025-55753, CVE-2025-59775, CVE-2025-65082, and CVE-2025-66200.
- The patch for CVE-2025-55163 also addresses CVE-2025-58056.
- The patch for CVE-2025-8194 also addresses CVE-2025-6069.
- The patch for CVE-2025-5987 also addresses CVE-2025-4877, CVE-2025-4878, CVE-2025-5351, CVE-2025-5372, and CVE-2025-5449.
- The patch for CVE-2025-49844 also addresses CVE-2025-46817, CVE-2025-46818, and CVE-2025-46819.
Oracle Construction and Engineering Risk Matrix
This Critical Patch Update contains 8 new security patches for Oracle Construction and Engineering. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2021-43113
- Product: Primavera Unifier
- Component: Reports (iTextPDF)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- CVE ID: CVE-2025-66516
- Product: Primavera Unifier
- Component: Integration (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- Low
- 21.12.0-21.12.17, 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- CVE ID: CVE-2025-41249
- Product: Primavera Gateway
- Component: Admin (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 21.12.0-21.12.16
- CVE ID: CVE-2025-41249
- Product: Primavera Unifier
- Component: Integration (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 22.12.0-22.12.15, 23.12.0-23.12.16, 24.12.0-24.12.12, 25.12.0
- CVE ID: CVE-2025-48795
- Product: Primavera P6 Enterprise Project Portfolio Management
- Component: Integrators (Apache CXF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.6
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- Low
- 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0
- CVE ID: CVE-2025-68161
- Product: Primavera Gateway
- Component: Admin (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 21.12.0-21.12.16
- CVE ID: CVE-2025-26791
- Product: Primavera P6 Enterprise Project Portfolio Management
- Component: Team Member (DOMPurify)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.9
- Supported Versions Affected: Local
- Notes: High
- Low
- Required
- Changed
- Low
- Low
- None
- 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.11.0
- CVE ID: CVE-2025-48734
- Product: Primavera P6 Enterprise Project Portfolio Management
- Component: Web Access (Apache Commons BeanUtils)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.7
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- None
- None
- 21.12.0.0-21.12.21.5, 22.12.0.0-22.12.20.0, 23.12.0.0-23.12.17.0, 24.12.0.0-24.12.6.0
Additional CVEs addressed are:
- The patch for CVE-2025-41249 also addresses CVE-2025-41242.
Oracle E-Business Suite Risk Matrix
This Critical Patch Update contains 8 new security patches for Oracle E-Business Suite. 2 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
Oracle E-Business Suite products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle E-Business Suite products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle E-Business Suite risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle E-Business Suite products, Oracle recommends that customers apply the January 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Oracle E-Business Suite. For information on what patches need to be applied to your environments, refer to Oracle E-Business Suite Release 12 Critical Patch Update Knowledge Document (January 2026), My Oracle Support Note KA923.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-48734
- Product: Oracle Field Service
- Component: HTML Dispatch Center (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2025-48734
- Product: Oracle Human Resources
- Component: iRecruitment (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2025-48734
- Product: Oracle Succession planning
- Component: Suitability Analyzer (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2025-48734
- Product: Oracle Time and Labor
- Component: Core (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21960
- Product: Oracle Applications DBA
- Component: Java utils
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- High
- None
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21943
- Product: Oracle Scripting
- Component: Scripting Admin
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21972
- Product: Oracle Configurator
- Component: User Interface
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- None
- None
- 12.2.3-12.2.15
- CVE ID: CVE-2026-21959
- Product: Oracle Workflow
- Component: Workflow Loader
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- None
- None
- 12.2.3-12.2.15
Oracle Enterprise Manager Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle Enterprise Manager. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. None of these patches are applicable to client-only installations, i.e., installations that do not have Oracle Enterprise Manager installed. The English text form of this Risk Matrix can be found here.
Oracle Enterprise Manager products include Oracle Database and Oracle Fusion Middleware components that are affected by the vulnerabilities listed in the Oracle Database and Oracle Fusion Middleware sections. The exposure of Oracle Enterprise Manager products is dependent on the Oracle Database and Oracle Fusion Middleware versions being used. Oracle Database and Oracle Fusion Middleware security updates are not listed in the Oracle Enterprise Manager risk matrix. However, since vulnerabilities affecting Oracle Database and Oracle Fusion Middleware versions may affect Oracle Enterprise Manager products, Oracle recommends that customers apply the January 2026 Critical Patch Update to the Oracle Database and Oracle Fusion Middleware components of Enterprise Manager. For information on what patches need to be applied to your environments, refer to Critical Patch Update January 2026 Patch Availability Document for Oracle Products, My Oracle Support Note CPU6.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2024-13009
- Product: Oracle Enterprise Manager Base Platform
- Component: Gateway (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 24.1
- CVE ID: CVE-2024-13009
- Product: Oracle Enterprise Manager Base Platform
- Component: Oracle Enterprise Manager Base Platform - Agent Next Gen (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 13.5, 24.1
- CVE ID: CVE-2025-48924
- Product: Oracle Application Testing Suite
- Component: Load Testing for Web Apps (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 13.3.0.1
- CVE ID: CVE-2025-48924
- Product: Oracle Enterprise Manager Base Platform
- Component: Agent Next Gen (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 13.5, 24.1
Oracle Financial Services Applications Risk Matrix
This Critical Patch Update contains 38 new security patches for Oracle Financial Services Applications. 33 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Branch
- Component: Reports (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Cash Management
- Component: Accessibility (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Corporate Lending Process Management
- Component: Base (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Liquidity Management
- Component: Common Core (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-49796
- Product: Oracle Banking Supply Chain Finance
- Component: Security (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-48734
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48734
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2026-21973
- Product: Oracle FLEXCUBE Investor Servicing
- Component: Security Management System
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- None
- 14.5.0.15.0, 14.7.0.8.0, 14.8.0.1.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Branch
- Component: Reports (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- CVE ID: CVE-2025-48976
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-27817
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Kafka)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Cash Management
- Component: Accessibility (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Banking Cash Management
- Component: Accessibility (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-9230
- Product: Oracle Banking Cash Management
- Component: Accessibility (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Corporate Lending Process Management
- Component: Base (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- CVE ID: CVE-2025-48976
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-27817
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Kafka)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-9230
- Product: Oracle Banking Liquidity Management
- Component: Common Core (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Banking Supply Chain Finance
- Component: Security (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Banking Supply Chain Finance
- Component: Security (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-9230
- Product: Oracle Banking Supply Chain Finance
- Component: Security (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.8.1.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle Financial Services Compliance Studio
- Component: Reports (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 2.6.0
- CVE ID: CVE-2025-66418
- Product: Oracle Financial Services Compliance Studio
- Component: Reports (urllib3)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 2.6.0
- CVE ID: CVE-2025-41249
- Product: Oracle Financial Services Model Management and Governance
- Component: Installer (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 8.1.3.2
- CVE ID: CVE-2025-41248
- Product: Oracle Financial Services Model Management and Governance
- Component: Installer (Spring Security)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 8.1.3.2
- CVE ID: CVE-2025-22228
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Spring Security)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 14.5.0.14.0
- CVE ID: CVE-2026-21978
- Product: Oracle FLEXCUBE Universal Banking
- Component: Relationship Pricing
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- None
- None
- 14.0.0.0.0-14.8.0.0.0
- CVE ID: CVE-2025-48795
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache CXF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.6
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48795
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache CXF)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.6
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Branch
- Component: Reports (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0, 14.8.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Cash Management
- Component: Accessibility (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Corporate Lending Process Management
- Component: Base (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.0.0, 14.6.0.0.0, 14.7.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Liquidity Management
- Component: Common Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Banking Supply Chain Finance
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.5.0.15.0, 14.6.0.11.0, 14.7.0.9.0, 14.8.0.1.0, 14.8.1.0.0
- CVE ID: CVE-2025-61795
- Product: Oracle Financial Services Model Management and Governance
- Component: Installer (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 8.1.3.2
- CVE ID: CVE-2025-48924
- Product: Oracle Insurance Policy Administration J2EE
- Component: Architecture (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.3.1-12.0.6
Additional CVEs addressed are:
- The patch for CVE-2025-66418 also addresses CVE-2025-66471.
- The patch for CVE-2025-27817 also addresses CVE-2025-27818.
- The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
- The patch for CVE-2025-9230 also addresses CVE-2025-9231 and CVE-2025-9232.
Oracle Fusion Middleware Risk Matrix
This Critical Patch Update contains 51 new security patches for Oracle Fusion Middleware. 47 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
To get the full list of current and previously released Critical Patch Update patches for Oracle Fusion Middleware products, refer to My Oracle Support Doc ID KA1182.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: Oracle Business Process Management Suite
- Component: Runtime Engine (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2026-21962
- Product: Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in
- Component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- None
- 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0
- See Note 1
- CVE ID: CVE-2025-66516
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-54988
- Product: Oracle Business Process Management Suite
- Component: Oracle Business Rules (Apache Commons Compress)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-4949
- Product: Oracle Data Integrator
- Component: Security (Eclipse JGit)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-4949
- Product: Oracle Fusion Middleware
- Component: Oracle Database Client for Fusion Middleware (Eclipse JGit)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-54874
- Product: Oracle Outside In Technology
- Component: Core (OpenJPEG)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 8.5.7, 8.5.8
- CVE ID: CVE-2025-49796
- Product: Oracle HTTP Server
- Component: Core (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-23048
- Product: Oracle HTTP Server
- Component: SSL Module (Apache HTTP Server)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- None
- 14.1.2.0.0
- CVE ID: CVE-2024-56406
- Product: Oracle Fusion Middleware
- Component: Third Party (Perl)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2022-41342
- Product: Oracle Access Manager
- Component: Webserver Plugin (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0
- CVE ID: CVE-2022-41342
- Product: Oracle Fusion Middleware
- Component: Dynamic Monitoring Service, Oracle Notification Service, libiau (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0
- See Note 2
- CVE ID: CVE-2022-41342
- Product: Oracle HTTP Server
- Component: Core (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0
- See Note 2
- CVE ID: CVE-2022-41342
- Product: Oracle Weblogic Server Proxy Plug-in
- Component: Oracle Weblogic Server Proxy Plug-in for Apache HTTP Server (Intel C++ Compiler Classic)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 12.2.1.4.0, 14.1.1.0.0
- See Note 2
- CVE ID: CVE-2025-48976
- Product: Oracle Business Process Management Suite
- Component: Composer (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-5115
- Product: Oracle Coherence
- Component: Centralized Third Party Jars (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.1.0.0
- CVE ID: CVE-2025-55163
- Product: Oracle Data Integrator
- Component: Runtime Java agent (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0
- CVE ID: CVE-2024-42516
- Product: Oracle HTTP Server
- Component: Core (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-59375
- Product: Oracle HTTP Server
- Component: Core (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2024-43204
- Product: Oracle HTTP Server
- Component: mod_proxy (Apache HTTP Server)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-54571
- Product: Oracle HTTP Server
- Component: mod_security (ModSecurity)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2024-47252
- Product: Oracle HTTP Server
- Component: SSL module (Apache HTTP Server)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle Identity Manager
- Component: Installer (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-41249
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-59375
- Product: Oracle Outside In Technology
- Component: Core (LibExpat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.5.7, 8.5.8
- CVE ID: CVE-2025-48976
- Product: Oracle Service Bus
- Component: Core (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0
- CVE ID: CVE-2025-48976
- Product: Oracle SOA Suite
- Component: Rest Converters (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-43967
- Product: Oracle WebCenter Enterprise Capture
- Component: Client Bundle (libheif)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-41248
- Product: Oracle WebCenter Sites
- Component: Core (Spring Security)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 14.1.2.0.0
- CVE ID: CVE-2025-48976
- Product: Oracle WebLogic Server
- Component: Centralized Third Party Jars (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0, 14.1.1.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle WebLogic Server
- Component: Core (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0
- CVE ID: CVE-2025-55163
- Product: Service Delivery Platform
- Component: Messaging Enabler (Netty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 14.1.2.0.0
- CVE ID: CVE-2025-12383
- Product: Oracle Global Lifecycle Management NextGen OUI Framework
- Component: NextGen Installer (Eclipse Jersey)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 15.1.1.0.0, 15.1.1.0.0
- CVE ID: CVE-2025-12383
- Product: Oracle WebLogic Server
- Component: Centralized Third Party Jars (Eclipse Jersey)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- None
- 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0
- CVE ID: CVE-2024-13009
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 14.1.2.0.0
- CVE ID: CVE-2024-13009
- Product: Oracle Unified Directory
- Component: Core (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- Low
- Low
- None
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-26333
- Product: Oracle Fusion Middleware
- Component: Oracle Database Client for Fusion Middleware (BSAFE Crypto-J)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 14.1.2.0.0
- CVE ID: CVE-2025-26333
- Product: Oracle Security Service
- Component: Third Party (BSAFE Crypto-J)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 12.2.1.4.0
- CVE ID: CVE-2021-45105
- Product: Oracle WebCenter Sites
- Component: Core (Apache Log4j)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- None
- High
- 12.2.1.4.0
- CVE ID: CVE-2025-53864
- Product: Oracle WebLogic Server
- Component: Centralized Third Party Jars (Nimbus JOSE+JWT)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Access Manager
- Component: Identity Store Access (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-48924
- Product: Oracle Business Process Management Suite
- Component: Composer (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.1.2.0.0
- CVE ID: CVE-2025-31672
- Product: Oracle Fusion Middleware
- Component: Oracle Database Client for Fusion Middleware (Apache POI)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- None
- 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Identity Manager
- Component: Third Party (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0
- CVE ID: CVE-2025-48924
- Product: Oracle Identity Manager Connector
- Component: Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.1.0
- CVE ID: CVE-2025-48924
- Product: Oracle Managed File Transfer
- Component: Runtime Server (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-31672
- Product: Oracle Middleware Common Libraries and Tools
- Component: Third Party (Apache POI)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- None
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Service Bus
- Component: Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle SOA Suite
- Component: Adapters (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.1.2.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle WebCenter Sites
- Component: Core (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.2.0.0
- CVE ID: CVE-2024-47554
- Product: Oracle WebLogic Server
- Component: Console (Apache Commons IO)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- None
- None
- Low
- 12.2.1.4.0, 14.1.1.0.0
Notes:
- Affected version for Weblogic Server Proxy Plug-in for IIS is 12.2.1.4.0 only
- Applies to LINUX only
Additional CVEs addressed are:
- The patch for CVE-2024-13009 also addresses CVE-2024-6763.
- The patch for CVE-2025-54571 also addresses CVE-2025-47947, CVE-2025-48866, and CVE-2025-52891.
- The patch for CVE-2025-66516 also addresses CVE-2025-54988.
- The patch for CVE-2024-47252 also addresses CVE-2025-49812.
- The patch for CVE-2025-43967 also addresses CVE-2025-43966.
- The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
- The patch for CVE-2022-41342 also addresses CVE-2022-40196.
Oracle Analytics Risk Matrix
This Critical Patch Update contains 8 new security patches, plus additional third party patches noted below, for Oracle Analytics. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2021-23926
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Core (Apache XMLBeans)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- High
- 8.2.0.0.0
- CVE ID: CVE-2025-52999
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Analytics Server (jackson-core)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.6.0.0.0, 8.2.0.0.0
- CVE ID: CVE-2024-57699
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Analytics Server (json-smart)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- CVE ID: CVE-2025-9230
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Platform Security (OpenSSL)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- CVE ID: CVE-2022-45047
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Core (Apache Mina SSHD)
- Protocol: SSH
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- High
- High
- 8.2.0.0.0
- CVE ID: CVE-2026-21976
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Oracle Analytics Cloud
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.1
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- None
- 7.6.0.0.0, 8.2.0.0.0
- CVE ID: CVE-2025-48924
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Platform Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
- CVE ID: CVE-2025-31672
- Product: Oracle Business Intelligence Enterprise Edition
- Component: Analytics Server (Apache POI)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 7.6.0.0.0, 8.2.0.0.0, 12.2.1.4.0
Additional CVEs addressed are:
- The patch for CVE-2025-9230 also addresses CVE-2025-9232.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle BI Publisher
- Development Operations (Apache Tomcat): CVE-2025-41249 [VEX Justification: vulnerable_code_not_in_execute_path].
- Oracle Business Intelligence Enterprise Edition
- Platform Security (Bouncy Castle Java Library): CVE-2025-8885 and CVE-2024-30171 [VEX Justification: vulnerable_code_cannot_be_controlled_by_adversary].
Oracle Health Sciences Applications Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle Health Sciences Applications. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21980
- Product: Oracle Life Sciences Central Coding
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 7.0.1.0
- CVE ID: CVE-2026-21970
- Product: Oracle Life Sciences Central Designer
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- None
- None
- 7.0.1.0
- CVE ID: CVE-2026-21923
- Product: Oracle Life Sciences Central Designer
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- Low
- None
- 7.0.1.0
- CVE ID: CVE-2023-29081
- Product: Oracle Life Sciences Central Coding
- Component: Installation and Configuration (InstallShield)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.5
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 7.0.1.0
- CVE ID: CVE-2026-21974
- Product: Oracle Life Sciences Central Designer
- Component: Platform
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- None
- None
- 7.0.1.0
Oracle HealthCare Applications Risk Matrix
This Critical Patch Update contains 6 new security patches for Oracle HealthCare Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2024-52046
- Product: Oracle Health Sciences Information Manager
- Component: XAD-PID Change Management XPID (Apache Mina)
- Protocol: SSH
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 4.0.0
- CVE ID: CVE-2025-41249
- Product: Oracle Healthcare Master Person Index
- Component: Master Index Data Manager (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 5.0.0.0-5.0.9.5
- CVE ID: CVE-2025-68161
- Product: Oracle Health Sciences Information Manager
- Component: Health Record Locator (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 4.0.0
- CVE ID: CVE-2025-68161
- Product: Oracle Healthcare Data Repository
- Component: FHIR Server (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 8.2.0.5, 8.2.0.6
- CVE ID: CVE-2025-68161
- Product: Oracle Healthcare Master Person Index
- Component: Master Index Data Manager (Apache Log4j)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Changed
- Low
- Low
- None
- 5.0.0.0-5.0.9.5
- CVE ID: CVE-2024-47554
- Product: Oracle Health Sciences Information Manager
- Component: Install (Apache Commons IO)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.3
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- None
- None
- Low
- 4.0.0
Oracle Hospitality Applications Risk Matrix
This Critical Patch Update contains 4 new security patches for Oracle Hospitality Applications. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21967
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera Servlet
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- Low
- Low
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
- CVE ID: CVE-2025-48976
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
- CVE ID: CVE-2026-21966
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
- CVE ID: CVE-2025-48924
- Product: Oracle Hospitality OPERA 5 Property Services
- Component: Opera (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 5.6.19, 5.6.25, 5.6.26, 5.6.27
Oracle Hyperion Risk Matrix
This Critical Patch Update contains 12 new security patches for Oracle Hyperion. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-49796
- Product: Oracle Hyperion Infrastructure Technology
- Component: Install and Configuration (libxml2)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.1
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- High
- 11.2.23
- CVE ID: CVE-2025-27363
- Product: Oracle Hyperion Financial Reporting
- Component: Install (FreeType)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 11.2.23
- CVE ID: CVE-2025-43967
- Product: Oracle Hyperion Financial Reporting
- Component: Install (libheif)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Calculation Manager
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Financial Close Management
- Component: Close Manager (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Financial Management
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Financial Reporting
- Component: Server Components (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Infrastructure Technology
- Component: Install and Configuration (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Planning
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2025-48924
- Product: Oracle Hyperion Profitability and Cost Management
- Component: Install (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 11.2.23
- CVE ID: CVE-2026-21922
- Product: Oracle Planning and Budgeting Cloud Service
- Component: EPM Agent
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.2
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- None
- High
- None
- 25.04.07
- See Note 1
- CVE ID: CVE-2026-21979
- Product: Oracle Planning and Budgeting Cloud Service
- Component: EPM Agent
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.2
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- High
- None
- None
- 25.04.07
- See Note 1
Notes:
- Update EPM Agent. Please refer to Downloading the EPM Agent for more information.
Additional CVEs addressed are:
- The patch for CVE-2025-43967 also addresses CVE-2025-43966.
- The patch for CVE-2025-49796 also addresses CVE-2025-49794 and CVE-2025-49795.
Oracle Java SE Risk Matrix
This Critical Patch Update contains 11 new security patches for Oracle Java SE. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
The CVSS scores below assume that a user running a Java applet or Java Web Start application has administrator privileges (typical on Windows). When the user does not run with administrator privileges (typical on Solaris and Linux), the corresponding CVSS impact scores for Confidentiality, Integrity, and Availability are "Low" instead of "High", lowering the CVSS Base Score. For example, a Base Score of 9.6 becomes 7.1.
Java Management Service, available to all users, can help you find vulnerable Java versions in your systems. Java SE Subscribers and customers running in Oracle Cloud can use Java Management Service to update Java Runtimes and to do further security reviews like identifying potentially vulnerable third party libraries used by your Java programs. Existing Java Management Service user click here to log in to your dashboard. The Java Management Service Documentation provides a list of features available to everyone and those available only to customers. Learn more about using Java Management Service to monitor and secure your Java Installations.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-43368
- Product: Oracle Java SE
- Component: JavaFX (WebKitGTK)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- High
- High
- High
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2025-7425
- Product: Oracle Java SE
- Component: JavaFX (libxslt)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- High
- High
- High
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2026-21945
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: Security
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 1
- CVE ID: CVE-2026-21932
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: AWT, JavaFX
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.4
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- None
- High
- None
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 1
- CVE ID: CVE-2026-21933
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: Networking
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 2
- CVE ID: CVE-2025-6021
- Product: Oracle Java SE
- Component: JavaFX (libxml2)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- None
- High
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2025-12183
- Product: Oracle JDK Mission Control
- Component: Mission Control (lz4-java)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Un-changed
- Low
- None
- Low
- Oracle JDK Mission Control: 9.1.1
- CVE ID: CVE-2026-21925
- Product: Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition
- Component: RMI
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.8
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- Low
- Low
- None
- Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17, 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16
- See Note 2
- CVE ID: CVE-2025-6052
- Product: Oracle Java SE
- Component: JavaFX (glibc)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.7
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- None
- None
- Low
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2026-21947
- Product: Oracle Java SE
- Component: JavaFX
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- None
- Low
- None
- Oracle Java SE: 8u471-b50
- See Note 1
- CVE ID: CVE-2025-47219
- Product: Oracle Java SE
- Component: JavaFX (gstreamer)
- Protocol: Multiple
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 3.1
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Un-changed
- Low
- None
- None
- Oracle Java SE: 8u471-b50
- See Note 2
Notes:
- This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
- This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Additional CVEs addressed are:
- The patch for CVE-2025-43368 also addresses CVE-2025-43272, CVE-2025-43342, and CVE-2025-43356.
- The patch for CVE-2025-47219 also addresses CVE-2025-47183.
- The patch for CVE-2025-7425 also addresses CVE-2025-10911 and CVE-2025-7424.
- The patch for CVE-2025-6021 also addresses CVE-2025-8732.
Oracle JD Edwards Risk Matrix
This Critical Patch Update contains 7 new security patches for Oracle JD Edwards. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-27363
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (FreeType)
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2023-1393
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (X.Org Server)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.8
- Supported Versions Affected: Local
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2025-27210
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (Node.js)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2023-42670
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (Samba)
- Protocol: SMB
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2026-21946
- Product: JD Edwards EnterpriseOne Tools
- Component: Web Runtime SEC
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 9.2.0.0-9.2.26.0
- CVE ID: CVE-2025-26333
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (BSAFE Crypto-J)
- Protocol: Oracle Net
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 9.2.0.0-9.2.9.4
- CVE ID: CVE-2024-43796
- Product: JD Edwards EnterpriseOne Tools
- Component: E1 Dev Platform Tech - Cloud (Express.js)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.7
- Supported Versions Affected: Network
- Notes: High
- None
- Required
- Changed
- Low
- Low
- None
- 9.2.0.0-9.2.9.4
Additional CVEs addressed are:
- The patch for CVE-2023-42670 also addresses CVE-2023-4091, CVE-2023-4154, and CVE-2023-42669.
- The patch for CVE-2025-27210 also addresses CVE-2025-27209.
Oracle MySQL Risk Matrix
This Critical Patch Update contains 20 new security patches for Oracle MySQL. 7 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-6965
- Product: MySQL Server
- Component: Server: Docker Images (SQLite)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 8.4.0-8.4.7
- See Note 1
- CVE ID: CVE-2025-9230
- Product: MySQL Connectors
- Component: Connector/C++ (OpenSSL)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2025-9230
- Product: MySQL Connectors
- Component: Connector/ODBC (OpenSSL)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2025-9086
- Product: MySQL Enterprise Backup
- Component: Enterprise Backup (curl)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.43, 8.4.0-8.4.6, 9.0.0-9.4.0
- CVE ID: CVE-2025-9230
- Product: MySQL Enterprise Backup
- Component: Enterprise Backup (OpenSSL)
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2025-9230
- Product: MySQL Server
- Component: Server: Packaging (OpenSSL)
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2025-9230
- Product: MySQL Workbench
- Component: MySQL Workbench (OpenSSL)
- Protocol: MySQL Workbench
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.45
- CVE ID: CVE-2025-65018
- Product: MySQL Workbench
- Component: MySQL Workbench (libpng)
- Protocol: MySQL Workbench
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.1
- Supported Versions Affected: Local
- Notes: Low
- None
- Required
- Un-changed
- None
- High
- High
- 8.0.0-8.0.45
- CVE ID: CVE-2026-21949
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21950
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21968
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21929
- Product: MySQL Server
- Component: Server: Parser
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21936
- Product: MySQL Cluster
- Component: Cluster: General
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 7.6.0-7.6.36, 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21936
- Product: MySQL Server
- Component: InnoDB
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21937
- Product: MySQL Server
- Component: Server: DDL
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21941
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21948
- Product: MySQL Server
- Component: Server: Optimizer
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21952
- Product: MySQL Server
- Component: Server: Parser
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 9.0.0-9.5.0
- CVE ID: CVE-2026-21964
- Product: MySQL Server
- Component: Server: Thread Pooling
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.9
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- High
- 8.0.0-8.0.44, 8.4.0-8.4.7, 9.0.0-9.5.0
- CVE ID: CVE-2026-21965
- Product: MySQL Server
- Component: Server: Pluggable Auth
- Protocol: MySQL Protocol
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.7
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- None
- None
- Low
- 9.0.0-9.5.0
Notes:
- This vulnerability applies to MySQL server docker images and SQLite isn't directly used by MySQL server.
Additional CVEs addressed are:
- The patch for CVE-2025-9230 also addresses CVE-2025-9232.
- The patch for CVE-2025-9086 also addresses CVE-2025-10148.
- The patch for CVE-2025-65018 also addresses CVE-2025-64505, CVE-2025-64506, and CVE-2025-64720.
Oracle PeopleSoft Risk Matrix
This Critical Patch Update contains 12 new security patches for Oracle PeopleSoft. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-66516
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch (Apache Tika)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 10.0
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Changed
- High
- High
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-6965
- Product: PeopleSoft Enterprise PeopleTools
- Component: Porting (SQLite)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-9086
- Product: PeopleSoft Enterprise PeopleTools
- Component: File Processing (curl)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-27210
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch Dashboards (Node.js)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-9230
- Product: PeopleSoft Enterprise PeopleTools
- Component: Security (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21961
- Product: PeopleSoft Enterprise HCM Human Resources
- Component: Company Dir / Org Chart Viewer, Employee Snapshot
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 9.2
- CVE ID: CVE-2026-21951
- Product: PeopleSoft Enterprise PeopleTools
- Component: Integration Broker
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21938
- Product: PeopleSoft Enterprise PeopleTools
- Component: Portal
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21934
- Product: PeopleSoft Enterprise PeopleTools
- Component: Push Notifications
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 8.60, 8.61, 8.62
- CVE ID: CVE-2026-21971
- Product: PeopleSoft Enterprise SCM Purchasing
- Component: Purchasing
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- Low
- Low
- None
- 9.2
- CVE ID: CVE-2025-48924
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 8.60, 8.61, 8.62
- CVE ID: CVE-2025-55163
- Product: PeopleSoft Enterprise PeopleTools
- Component: OpenSearch (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 8.60, 8.61, 8.62
Additional CVEs addressed are:
- The patch for CVE-2025-9086 also addresses CVE-2025-10148.
- The patch for CVE-2025-66516 also addresses CVE-2025-54988.
- The patch for CVE-2025-27210 also addresses CVE-2025-23084 and CVE-2025-27209.
- The patch for CVE-2025-9230 also addresses CVE-2025-9231 and CVE-2025-9232.
Oracle Retail Applications Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Retail Applications. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-48734
- Product: Oracle Retail Advanced Inventory Planning
- Component: Operations and Maintenance (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 15.0.3, 16.0.3
- CVE ID: CVE-2025-48734
- Product: Oracle Retail Allocation
- Component: Security (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 15.0.3, 16.0.3
- CVE ID: CVE-2025-48734
- Product: Oracle Retail Fiscal Management
- Component: NF Issuing (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 14.2
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Bulk Data Integration
- Component: BDI Job Scheduler (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Financial Integration
- Component: PeopleSoft Integration (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Integration Bus
- Component: RIB Kernal (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Predictive Application Server
- Component: RPAS Client (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 15.0.3, 16.0.3
- CVE ID: CVE-2025-41249
- Product: Oracle Retail Service Backbone
- Component: RSB Installation (Spring Framework)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-7962
- Product: Oracle Retail Xstore Office
- Component: Security (Jakarta Mail)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 25.0.1
- CVE ID: CVE-2025-26333
- Product: Oracle Retail Integration Bus
- Component: RIB Kernal (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-26333
- Product: Oracle Retail Predictive Application Server
- Component: RPAS Server (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 15.0.3
- CVE ID: CVE-2025-26333
- Product: Oracle Retail Service Backbone
- Component: RSB Installation (BSAFE Crypto-J)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.9
- Supported Versions Affected: Network
- Notes: High
- None
- None
- Un-changed
- High
- None
- None
- 16.0.3, 19.0.1
- CVE ID: CVE-2025-48924
- Product: Oracle Retail Fiscal Management
- Component: NF Issuing (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 14.2
- CVE ID: CVE-2025-61795
- Product: Oracle Retail Xstore Point of Service
- Component: Xenvironment (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- None
- None
- High
- 20.0.5, 21.0.4, 22.0.2, 23.0.2, 24.0.1, 25.0.0
Oracle Siebel CRM Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Siebel CRM. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-6965
- Product: Siebel CRM Cloud Applications
- Component: Siebel Cloud Manager (OpenSearch Dashboards)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 17.0-25.11
- CVE ID: CVE-2025-53547
- Product: Siebel CRM Cloud Applications
- Component: Siebel Cloud Manager (Helm)
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.6
- Supported Versions Affected: Local
- Notes: Low
- None
- Required
- Changed
- High
- High
- High
- 17.0-25.9
- CVE ID: CVE-2025-48976
- Product: Siebel Apps - Marketing
- Component: Email Marketing (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.9
- CVE ID: CVE-2025-53643
- Product: Siebel CRM Cloud Applications
- Component: Siebel Cloud Manager (AIOHTTP)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- High
- None
- 17.0-25.9
- CVE ID: CVE-2025-27817
- Product: Siebel CRM Deployment
- Component: Application Interface (Apache Log4j)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 17.0-25.10
- CVE ID: CVE-2025-48989
- Product: Siebel CRM Deployment
- Component: Application Interface (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.10
- CVE ID: CVE-2021-33813
- Product: Siebel CRM Deployment
- Component: Application Interface (JDOM)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.11
- CVE ID: CVE-2026-21926
- Product: Siebel CRM Deployment
- Component: Server Infrastructure
- Protocol: TLS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 17.0-25.2
- CVE ID: CVE-2024-23807
- Product: Siebel CRM Integration
- Component: EAI (Apache Xerces-C++)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.2
- Supported Versions Affected: Network
- Notes: Low
- High
- None
- Un-changed
- High
- High
- High
- 17.0-25.9
- CVE ID: CVE-2025-4575
- Product: Siebel CRM Deployment
- Component: Server Infrastructure (OpenSSL)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- Low
- 17.0-25.11
- CVE ID: CVE-2022-23395
- Product: Siebel CRM Deployment
- Component: Application Interface (jquery-cookie)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.1
- Supported Versions Affected: Network
- Notes: Low
- None
- Required
- Changed
- Low
- Low
- None
- 17.0-25.9
- CVE ID: CVE-2025-8916
- Product: Siebel CRM Deployment
- Component: Server Infrastructure (Bouncy Castle Java Library)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 17.0-25.9
- CVE ID: CVE-2025-48924
- Product: Siebel CRM Integration
- Component: REST (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 17.0-25.9
- CVE ID: CVE-2025-5372
- Product: Siebel CRM Cloud Applications
- Component: Containers and Related Services (libssh)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.0
- Supported Versions Affected: Network
- Notes: High
- Low
- None
- Un-changed
- Low
- Low
- Low
- 17.0-25.9
Additional CVEs addressed are:
- The patch for CVE-2025-27817 also addresses CVE-2024-31141.
- The patch for CVE-2021-33813 also addresses CVE-2018-1000632 and CVE-2020-10683.
Oracle Supply Chain Risk Matrix
This Critical Patch Update contains 10 new security patches for Oracle Supply Chain. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21969
- Product: Oracle Agile Product Lifecycle Management for Process
- Component: Supplier Portal
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 6.2.4
- CVE ID: CVE-2025-54874
- Product: Oracle AutoVue Office
- Component: Security (OpenJPEG)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 9.8
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- High
- High
- 21.1.0
- See Note 1
- CVE ID: CVE-2025-48734
- Product: Oracle Agile PLM
- Component: Security (Apache Commons BeanUtils)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.8
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- High
- High
- 9.3.6
- CVE ID: CVE-2025-48976
- Product: Oracle Agile PLM
- Component: Folders, Files and Attachments (Apache Commons FileUpload)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.3.6
- CVE ID: CVE-2025-48989
- Product: Oracle Agile PLM
- Component: Security (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 9.3.6
- CVE ID: CVE-2026-21940
- Product: Oracle Agile PLM
- Component: User and User Group
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- High
- None
- None
- 9.3.6
- CVE ID: CVE-2025-5115
- Product: Oracle Autovue for Agile Product Lifecycle Management
- Component: Internal Operations (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 21.1.0
- CVE ID: CVE-2025-5115
- Product: Oracle AutoVue Office
- Component: Security (Eclipse Jetty)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 21.1.0
- See Note 2
- CVE ID: CVE-2026-21944
- Product: Oracle Agile Product Lifecycle Management for Process
- Component: Product Quality Management
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.5
- Supported Versions Affected: Network
- Notes: Low
- Low
- None
- Un-changed
- High
- None
- None
- 6.2.4
- CVE ID: CVE-2025-31672
- Product: Oracle Agile PLM
- Component: Document Management (Apache POI)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- Low
- None
- 9.3.6
Notes:
- This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
- This vulnerability applies to Oracle AutoVue Office, Oracle AutoVue 2D Professional, Oracle AutoVue 3D Professional Advanced, Oracle AutoVue EDA Professional and Oracle AutoVue Electro-Mechanical Professional. Please refer to Patch Availability Document for more details.
Oracle Systems Risk Matrix
This Critical Patch Update contains 5 new security patches for Oracle Systems. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21927
- Product: Oracle Solaris
- Component: Driver
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- High
- High
- None
- 11
- CVE ID: CVE-2026-21935
- Product: Oracle Solaris
- Component: Driver
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.8
- Supported Versions Affected: Local
- Notes: Low
- High
- Required
- Un-changed
- High
- High
- None
- 11
- CVE ID: CVE-2026-21928
- Product: Oracle Solaris
- Component: Kernel
- Protocol: TCP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- Low
- None
- None
- 11
- CVE ID: CVE-2026-21942
- Product: Oracle Solaris
- Component: Filesystems
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.0
- Supported Versions Affected: Local
- Notes: Low
- Low
- Required
- Un-changed
- None
- None
- High
- 10, 11
- CVE ID: CVE-2026-21930
- Product: Oracle ZFS Storage Appliance Kit
- Component: Filesystems
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 2.3
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Un-changed
- None
- Low
- None
- 8.8
Oracle Utilities Applications Risk Matrix
This Critical Patch Update contains 5 new security patches, plus additional third party patches noted below, for Oracle Utilities Applications. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2025-55163
- Product: Oracle Utilities Network Management System
- Component: Core (Netty)
- Protocol: HTTP/2
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 2.5.0.2.10, 2.6.0.1.9, 2.6.0.2.5
- CVE ID: CVE-2025-48989
- Product: Oracle Utilities Testing Accelerator
- Component: Core (Apache Tomcat)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- High
- 7.0.0.0.6, 7.0.0.1.4, 25.4.0.0.1
- CVE ID: CVE-2026-21924
- Product: Oracle Utilities Application Framework
- Component: General
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.4
- Supported Versions Affected: Network
- Notes: Low
- Low
- Required
- Changed
- Low
- Low
- None
- 4.4.0.3.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
- CVE ID: CVE-2025-48924
- Product: Oracle Utilities Application Framework
- Component: Security (Apache Commons Lang)
- Protocol: HTTP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 4.3.0.5.0, 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
- CVE ID: CVE-2025-8916
- Product: Oracle Utilities Application Framework
- Component: Security (Bouncy Castle Java Library)
- Protocol: HTTPS
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 5.3
- Supported Versions Affected: Network
- Notes: Low
- None
- None
- Un-changed
- None
- None
- Low
- 4.3.0.6.0, 4.4.0.0.0, 4.4.0.2.0, 4.4.0.3.0, 4.4.0.4.0, 4.5.0.0.0, 4.5.0.1.1, 4.5.0.1.3, 4.5.0.2.0, 25.4, 25.10
Additional CVEs addressed are:
- The patch for CVE-2025-48989 also addresses CVE-2025-52520.
Additional patches included in this Critical Patch Update for the following non-exploitable CVEs for this Oracle product family:
- Oracle Utilities Network Management System
- Core (Apache ZooKeeper): CVE-2024-51504 [VEX Justification: vulnerable_code_not_in_execute_path].
Oracle Virtualization Risk Matrix
This Critical Patch Update contains 14 new security patches for Oracle Virtualization. 1 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The English text form of this Risk Matrix can be found here.
- CVE ID: BaseScore
- Product: AttackVector
- Component: AttackComplex
- Protocol: PrivsReq'd
- RemoteExploitwithoutAuth.?: UserInteract
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): Scope
- Supported Versions Affected: Confid-entiality
- Notes: Inte-grity
- Avail-ability
- CVE ID: CVE-2026-21955
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21956
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21987
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21988
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21990
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.2
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21989
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 8.1
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- High
- Low
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21957
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Local
- Notes: High
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21983
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Local
- Notes: High
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21984
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: Local
- Notes: High
- High
- None
- Changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21982
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: TCP
- RemoteExploitwithoutAuth.?: Yes
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.5
- Supported Versions Affected: AdjacentNetwork
- Notes: High
- None
- None
- Un-changed
- High
- High
- High
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21986
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 7.1
- Supported Versions Affected: Local
- Notes: Low
- None
- None
- Changed
- None
- None
- High
- 7.1.14, 7.2.4
- See Note 1
- CVE ID: CVE-2026-21963
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.0
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- None
- None
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21985
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 6.0
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- High
- None
- None
- 7.1.14, 7.2.4
- CVE ID: CVE-2026-21981
- Product: Oracle VM VirtualBox
- Component: Core
- Protocol: None
- RemoteExploitwithoutAuth.?: No
- CVSS VERSION 3.1 RISK (see Risk Matrix Definitions): 4.6
- Supported Versions Affected: Local
- Notes: Low
- High
- None
- Changed
- Low
- None
- Low
- 7.1.14, 7.2.4
Notes:
- This vulnerability applies to Windows VMs only.
Related vulnerabilities: CVE-2021-23926CVE-2025-6965CVE-2026-21927CVE-2026-21957CVE-2021-45105CVE-2025-47910CVE-2025-6395CVE-2025-10148CVE-2025-64720CVE-2026-21970CVE-2025-8885CVE-2025-8869CVE-2026-21948CVE-2026-21987CVE-2025-52520CVE-2026-21958CVE-2024-52046CVE-2025-9230CVE-2025-41249CVE-2025-46818CVE-2026-21930CVE-2025-54988CVE-2025-53864CVE-2025-48924CVE-2026-21928CVE-2025-55753CVE-2025-27817CVE-2025-55754CVE-2026-21936CVE-2021-33813CVE-2025-6069CVE-2025-43966CVE-2026-21971CVE-2024-57699CVE-2025-8961CVE-2025-48976CVE-2026-21974CVE-2022-23395CVE-2024-23807CVE-2025-43272CVE-2026-21990CVE-2026-21955CVE-2026-21922CVE-2026-21983CVE-2025-59250CVE-2025-46819CVE-2025-47219CVE-2024-45720CVE-2026-21944CVE-2025-12383CVE-2025-65082CVE-2025-6021CVE-2025-48866CVE-2025-27210CVE-2024-56406CVE-2026-21941CVE-2026-21939CVE-2025-41234CVE-2026-21937CVE-2025-43368CVE-2018-1000632CVE-2026-21942CVE-2025-48734CVE-2025-41248CVE-2025-66200CVE-2024-30171CVE-2026-21989CVE-2025-61755CVE-2025-58056CVE-2025-13836CVE-2023-42670CVE-2025-5372CVE-2025-7424CVE-2026-21923CVE-2026-21925CVE-2025-59375CVE-2025-48989CVE-2026-21960CVE-2025-25193CVE-2025-49796CVE-2026-21929CVE-2025-48060CVE-2025-22233CVE-2026-21959CVE-2022-40196CVE-2026-21963CVE-2025-8732CVE-2026-21938CVE-2025-5318CVE-2025-50059CVE-2026-21933CVE-2026-21934CVE-2024-13009CVE-2025-55039CVE-2025-27152CVE-2025-10911CVE-2025-58057CVE-2025-6052CVE-2025-59419CVE-2025-47183CVE-2026-21977CVE-2025-48795CVE-2025-9231CVE-2025-5351CVE-2025-30065CVE-2026-21924CVE-2025-27533CVE-2023-29081CVE-2025-23084CVE-2025-8916CVE-2026-21962CVE-2023-4091CVE-2025-66471CVE-2026-21968CVE-2025-4878CVE-2025-65018CVE-2025-5449CVE-2025-52891CVE-2023-4154CVE-2025-32989CVE-2026-21951CVE-2026-21940CVE-2026-21965CVE-2025-66418CVE-2025-7425CVE-2026-21988CVE-2026-21932CVE-2025-64505CVE-2025-53547CVE-2026-21949CVE-2025-43967CVE-2020-10683CVE-2025-22228CVE-2026-21982CVE-2025-8177CVE-2026-21980CVE-2024-35195CVE-2025-7962CVE-2024-6763CVE-2026-21973CVE-2025-59775CVE-2025-32990CVE-2026-21964CVE-2025-6075CVE-2021-43113CVE-2026-21979CVE-2024-42516CVE-2025-54571CVE-2025-27363CVE-2025-46817CVE-2025-41242CVE-2025-27818CVE-2025-27209CVE-2025-9232CVE-2025-47947CVE-2024-31141CVE-2026-21976CVE-2025-13837CVE-2025-61795CVE-2024-12133CVE-2026-21945CVE-2026-21986CVE-2024-46901CVE-2025-67735CVE-2025-43356CVE-2025-46727CVE-2025-4877CVE-2026-21950CVE-2024-23337CVE-2025-4575CVE-2026-21975CVE-2025-49794CVE-2025-5987CVE-2026-21972CVE-2025-49812CVE-2025-49844CVE-2025-53643CVE-2026-21966CVE-2026-21926CVE-2025-12183CVE-2025-66516CVE-2026-21967CVE-2025-52999CVE-2023-6378CVE-2025-64718CVE-2025-58098CVE-2025-64506CVE-2025-55163CVE-2024-43796CVE-2022-45047CVE-2024-43204CVE-2025-26333CVE-2024-47554CVE-2025-5115CVE-2025-49795CVE-2025-31672CVE-2025-8291CVE-2026-21952CVE-2025-26791CVE-2025-9900CVE-2026-21978CVE-2025-58754CVE-2022-41342CVE-2025-8194CVE-2026-21984CVE-2026-21956CVE-2025-23048CVE-2026-21946CVE-2025-4949CVE-2026-21947CVE-2023-1393CVE-2026-21931CVE-2023-42669CVE-2025-66566CVE-2025-43342CVE-2026-21969CVE-2025-32988CVE-2024-47252CVE-2025-8176CVE-2026-21935CVE-2025-68161CVE-2026-21981CVE-2025-9086CVE-2026-21943CVE-2026-21985CVE-2024-51504CVE-2026-21961CVE-2025-12816CVE-2025-54874
CVEs affecting the Svelte ecosystem
We’ve released patches for 5 vulnerabilities across devalue, svelte, @sveltejs/kit, and @sveltejs/adapter-node. Here’s what you need to know:
Upgrade nowhttps://svelte.dev/blog/cves-affecting-the-svelte-ecosystem
If you’re using any of these packages, upgrade them to their corresponding non-vulnerable versions:
devalue:5.6.2svelte:5.46.4@sveltejs/kit:2.49.5@sveltejs/adapter-node:5.5.1
For cross-dependent packages — svelte and @sveltejs/kit depend on devalue — patched versions already include upgraded dependencies.
We’re extremely thankful to all of the security researchers who responsibly disclosed these vulnerabilities and worked with us to get them fixed, to the security team at Vercel who helped us navigate the disclosure process, and to the maintainers who worked to publish the fixes.
Over the last few weeks, we’ve seen a spate of high profile vulnerabilities affecting popular tools across the web development ecosystem. While they are unfortunate, it has been encouraging to see the community pulling together to keep end users safe. Using the lessons learned from these vulnerabilities, we will invest in processes that will help catch future bugs during the writing and review phases, before they go live.
If you think you have discovered a vulnerability in a package maintained by the Svelte team, we urge you to privately report it via the Security tab on the repo in question (or the Svelte repo, if unsure).
Details
Full reports are available in the published security advisories, but we’ve included a brief summary of each below.
CVE-2026-22775: DoS in devalue.parse due to memory/CPU exhaustion
- Packages affected:
devalue
- You’re affected if:
- You’re using
devalueversions5.1.0through5.6.1, and - You’re parsing user-controlled input
- You’re using
- Effects:
- A malicious payload can cause arbitrarily large memory allocation, potentially crashing the process
- SvelteKit applications using remote functions are vulnerable, as the parameters are run through
devalue.parse - If you don’t have remote functions enabled, SvelteKit is not vulnerable
CVE-2026-22774: DoS in devalue.parse due to memory exhaustion
(Yes, this is very similar to the previous CVE. No, it is not the same!)
- Packages affected:
devalue
- You’re affected if:
- You’re using
devalueversions5.3.0through5.6.1, and - You’re parsing user-controlled input
- You’re using
- Effects:
- A malicious payload can cause arbitrarily large memory allocation, potentially crashing the process
- SvelteKit applications using remote functions are vulnerable, as the parameters are run through
devalue.parse - If you don’t have remote functions enabled, SvelteKit is not vulnerable
CVE-2026-22803: Memory amplification DoS in Remote Functions binary form deserializer
- Packages affected:
@sveltejs/kit
- You’re affected if:
- You’re using SvelteKit versions
2.49.0through2.49.4, and - You’ve enabled the
experimental.remoteFunctionsflag, and - You’re using
form
- You’re using SvelteKit versions
- Effects:
- Users can submit a malicious request that causes your application to hang and allocate arbitrarily-large amounts of memory
CVE-2025-67647: Denial of service and possible SSRF when using prerendering
- Packages affected:
@sveltejs/kit@sveltejs/adapter-node
- You’re vulnerable to DoS if:
- You’re using
@sveltejs/kitversions2.44.0through2.49.4, and - Your app has at least one prerendered route
- You’re using
- You’re vulnerable to DoS and SSRF if:
- You’ve using
@sveltejs/kitversions2.19.0through2.49.4, and - Your app has at least one prerendered route, and
- You’re using
@sveltejs/adapter-nodewithout a configuredORIGINenvironment variable, and you are not using a reverse proxy that implements Host header validation
- You’ve using
- Effects:
- DoS causes the server process to die
- SSRF allows access to internal resources that can be reached without authentication from SvelteKit’s server runtime
- If the stars align, it’s possible to obtain SXSS via cache poisoning by forcing a potential CDN to cache an XSS returned by the attacker’s server (the latter being able to specify the cache-control of their choice)
CVE-2025-15265: XSS via hydratable
- Packages affected:
svelte
- You’re vulnerable if:
- You’re using
svelteversions5.46.0through5.46.3, and - You’re using
hydratable, and you’re passing unsanitized, user-controlled strings in as keys
- You’re using
- Effects:
- Your users are vulnerable to XSS if an attacker can manage to get a controlled key into
hydratablethat is then returned to another user
- Your users are vulnerable to XSS if an attacker can manage to get a controlled key into
Related vulnerabilities: GHSA-VW5P-8CQ8-M7MVGHSA-J62C-4X62-9R35CVE-2026-22803GHSA-G2PG-6438-JWPFCVE-2025-67647GHSA-J2F3-WQ62-6Q46CVE-2025-15265GHSA-6738-R8G5-QWP3CVE-2026-22774CVE-2026-22775
Vulnerabilities in various SAP products.
Related vulnerabilities: CVE-2026-0507CVE-2026-0494CVE-2026-0513CVE-2026-0503CVE-2026-0499CVE-2026-0497CVE-2026-0504CVE-2026-0511CVE-2026-0506CVE-2026-0495CVE-2026-0492CVE-2026-0496CVE-2026-0498CVE-2026-0491CVE-2026-0514CVE-2026-0501CVE-2026-0493CVE-2026-0500
CRITICAL SECURITY BULLETIN: Trend Micro Apex Central (on-premise) January 2026 Multiple Vulnerabilities
Affected Version(s)
| Product | Affected Version(s) | Platform | Language(s) |
|---|---|---|---|
| Apex Central (on-premise) | Versions below Build 7190 | Windows | English |
Solution
Trend Micro has released the following solutions to address the issue:
These are the minimum recommended version(s) of the patches and/or builds required to address the issue. Trend Micro highly encourages customers to obtain the latest version of the product if there is a newer one available than the one listed in this bulletin.
Customers are encouraged to visit Trend Micro’s Download Center to obtain prerequisite software (such as Service Packs) before applying any of the solutions above.
Vulnerability Details
CVE-2025-69258: LoadLibraryEX Remote Code Execution (RCE) Vulnerability
CVSSv3.1: 9.8: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.
CVE-2025-69259: Message Unchecked NULL Return Value Denial of Service (DoS) Vulnerability
CVSSv3.1: 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations.
Please note: authentication is not required in order to exploit this vulnerability.
CVE-2025-69260: Message Out-of-bounds Read Denial of Service (DoS) Vulnerability
CVSSv3.1: 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations.
Please note: authentication is not required in order to exploit this vulnerability.
Mitigating Factors
Exploiting these type of vulnerabilities generally require that an attacker has access (physical or remote) to a vulnerable machine. In addition to timely application of patches and updated solutions, customers are also advised to review remote access to critical systems and ensure policies and perimeter security is up-to-date.
However, even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to update to the latest builds as soon as possible.
Acknowledgement
Trend Micro would like to thank the following individuals/organizations for responsibly disclosing these issues and working with Trend Micro to help protect our customers:
Related vulnerabilities: CVE-2025-69258CVE-2025-69259CVE-2025-69260
gpg.fail
"in the hurry of leaving i forgot the sites src at home, sorry, had to rewrite the whole thing. expect a nicer site by tomorrow. im patching as we speak."
- reaper (<- to blame)
- Multiple Plaintext Attack on Detached PGP Signatures in GnuPG
- GnuPG Accepts Path Separators and Path Traversals in Literal Data "Filename" Field
- Cleartext Signature Plaintext Truncated for Hash Calculation
- Encrypted message malleability checks are incorrectly enforced causing plaintext recovery attacks
- Memory Corruption in ASCII-Armor Parsing
- Trusted comment injection (minisign)
- Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG
- OpenPGP Cleartext Signature Framework Susceptible to Format Confusion
- GnuPG Output Fails To Distinguish Signature Verification Success From Message Content
- Cleartext Signature Forgery in GnuPG
- Radix64 Line-Truncation Enabling Polyglot Attacks
- GnuPG may downgrade digest algorithm to SHA1 during key signature checking
- GnuPG Trust Packet Parsing Enables Adding Arbitrary Subkeys
- Trusted comment Injection (minisign)
Video https://media.ccc.de/v/39c3-to-sign-or-not-to-sign-practical-vulnerabilities-i/oembed
Related vulnerabilities: GCVE-1-2026-0001
Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
Critical
CVE-2025-20393
CWE-20
Summary
-
On December 10, Cisco became aware of a new cyberattack campaign targeting a limited subset of appliances with certain ports open to the internet that are running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. This attack allows the threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. The ongoing investigation has revealed evidence of a persistence mechanism planted by the threat actors to maintain a degree of control over compromised appliances.
Cisco strongly recommends that customers follow the guidance provided in the Recommendations section of this advisory to assess exposure and mitigate risks.
Cisco Talos discussed these attacks in the blog post UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4
Affected Products
-
Cisco continues to investigate this attack campaign. As the investigation progresses, Cisco will update this advisory as appropriate as more information becomes available.
This attack campaign affects Cisco Secure Email Gateway, both physical and virtual, and Cisco Secure Email and Web Manager appliances, both physical and virtual, when both of the following conditions are met:
- The appliance is configured with the Spam Quarantine feature.
- The Spam Quarantine feature is exposed to and reachable from the internet.
The Spam Quarantine feature is not enabled by default. Deployment guides for these products do not require this port to be directly exposed to the Internet.
Note: All releases of Cisco AsyncOS Software are affected by this attack campaign.
Determine Whether Spam Quarantine Is Enabled on a Cisco Secure Email Gateway Appliance
To determine whether the Spam Quarantine feature is configured and enabled on an appliance, connect to the web management interface and navigate to the following menu: Network > IP Interfaces > [Select the Interface on which Spam Quarantine is configured]. If the checkbox next to Spam Quarantine is checked, the feature is enabled.
Determine Whether Spam Quarantine Is Enabled on a Cisco Secure Email and Web Manager Appliance
To determine whether the Spam Quarantine feature is configured and enabled on an appliance, connect to the web management interface and navigate to the following menu: Management Appliance > Network > IP Interfaces > [Select the interface on which Spam Quarantine is configured]. If the checkbox next to Spam Quarantine is checked, the feature is enabled.
Only products listed in the Vulnerable Products section of this advisory are known to be affected by this attack campaign.
Cisco has confirmed that all devices that are part of Cisco Secure Email Cloud are not affected.
Cisco is not aware of any exploitation activity against Cisco Secure Web.
Indicators of Compromise
-
As part of the attack campaign described in this advisory, the threat actor planted a persistent covert channel that was used to remotely access the compromised appliance.
Customers who wish to explicitly verify whether an appliance has been compromised can open a Cisco Technical Assistance Center (TAC) case. To expedite our investigation into the potential compromise, please ensure that remote access is enabled on the affected appliances. For more guidance, see this tech note.
In any case, Cisco strongly recommends following the guidance listed in the Recommendations section of this advisory.
Workarounds
- There are no workarounds identified that directly mitigate the risk concerning this attack campaign, but administrators can view and follow the guidance provided in the Recommendations section of this advisory.
Recommendations
-
If an appliance has been identified as having the web management interface or the Spam Quarantine port exposed to and reachable from the internet, Cisco strongly recommends following a multi-step process to restore the appliance to a secure configuration, when possible. For additional information, see Useful Resources at the end of this section.
If restoring the appliance is not possible, Cisco recommends contacting TAC to check whether the appliance has been compromised. In case of confirmed compromise, rebuilding the appliances is, currently, the only viable option to eradicate the threat actors persistence mechanism from the appliance.
In addition, Cisco strongly recommends restricting access to the appliance and implementing robust access control mechanisms to ensure that ports are not exposed to unsecured networks.
General Recommendations For Hardening
- Prevent access from the internet to the appliance. If internet access to the appliance is required, restrict appliance access to only known, trusted hosts on ports/protocols that are included in the user guides.
- Protect Cisco Secure Email Gateway and Cisco Secure Email and Web Manager appliances behind a filtering device such as a firewall, and filter traffic to/from the appliances while only allowing known, trusted hosts to send traffic to the appliances. Using a two-layer firewall can provide flexibility in network planning so that end users do not connect directly to the outer DMZ. See the Deployment sections of the User Guides for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.
- For Cisco Secure Email Gateway, separate mail and management functionality onto separate network interfaces. This reduces the chance of unauthorized users accessing the internal Management Network. For more information, see the device user guides.
- Regularly monitor web log traffic for any unexpected traffic to/from appliances. Logging should be sent to an external server, if possible, and kept for a long enough duration so that post-event investigations can be performed with sufficient log data.
- Disable HTTP for the main administrator portal.
- Disable any network services that are not required, including HTTP and FTP. For more information about specific service functionality, see the Cisco Secure Email Gateway and Cisco Secure Email and Web Manager user guides.
- Upgrade the appliance to the latest version of Cisco AsyncOS Software.
- Use a strong form of end-user authentication to the appliances, such as SAML or Lightweight Directory Access Protocol (LDAP). For more secure methods of authentication, see Authentication Options for End Users Accessing Spam Management Features.
- Change the default administrator password to a more secure variant. Restrict access to the administrator account by creating user accounts based on necessary access requirements. In addition, create operator accounts for all administrators.
- Using SSL/TLS, obtain an SSL certificate from a certificate authority (CA) or create a self-signed certificate.
Useful Resources
The following resources can help restore an affected appliance to a secure state. Some of the documents are related to a specific product, but the procedures are mostly interchangeable. If customers have specific questions about a procedure, contact TAC.
To download replacement Virtual Appliances, visit the relevant Cisco Software Download page:
For information about exporting reporting data from an appliance, see Working with Reports.
For information about how to purge messages in the quarantine, see Spam Quarantine.
For additional information, see Centralizing Policy, Virus, and Outbreak Quarantines.
Exploitation and Public Announcements
- In December 2025, the Cisco Product Security Incident Response Team (PSIRT) became aware of potentially malicious activity that targets Cisco Secure Email Gateway and Cisco Secure Email and Web Manager appliances.
Source
- This attack campaign was initially found during the resolution of a Cisco TAC support case.
Cisco Security Vulnerability Policy
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Related to This Advisory
URL
Revision History
-
Version Description Section Status Date 1.0 Initial public release. - Interim 2025-DEC-17 Show Less
Legal Disclaimer
-
SOFTWARE DOWNLOADS AND TECHNICAL SUPPORT
The Cisco Support and Downloads page on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool. Please note that customers may download only software that was procured from Cisco directly or through a Cisco authorized reseller or partner and for which the license is still valid.
Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco Technical Assistance Center (TAC). Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.
When considering software upgrades, customers are advised to regularly consult the advisories for the relevant Cisco products to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
LEGAL DISCLAIMER DETAILS
CISCO DOES NOT MAKE ANY EXPRESS OR IMPLIED GUARANTEES OR WARRANTIES OF ANY KIND, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, CISCO DOES NOT GUARANTEE THE ACCURACY OR COMPLETENESS OF THIS INFORMATION. THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Copies or summaries of the information contained in this Security Advisory may lack important information or contain factual errors. Customers are advised to visit the Cisco Security Advisories page for the most recent version of this Security Advisory. The Cisco Product Security Incident Response Team (PSIRT) assesses only the affected and fixed release information that is documented in this advisory. See the Cisco Security Vulnerability Policy for more information.
Feedback
- Leave additional feedback
Related vulnerabilities: CVE-2025-20393
A "Privilege boundary violation" vulnerability is identified affecting multiple Radiometer Products. Exploitation of this vulnerability gives a user with physical access to the analyzer, the possibility to gain unauthorized access to functionalities outside the restricted environment. The vulnerability is due to weakness in the design of access control implementation in application software.
Other related CVE's are CVE-2025-14096 and CVE-2025-14097.
Affected customers have been informed about this vulnerability.
This CVE is being published to provide transparency.
Required configuration for Exposure
Physical access to the analyzer is needed.
Temporary work Around Only authorized people can physically access the analyzer.
Permanent solution Local Radiometer representatives will contact all affected customers to discuss a permanent solution.
Exploit Status Researchers have provided working proof-of-concept. Radiometer is not aware of any publicly available exploit at the time of publication.
Related vulnerabilities: CVE-2025-14096CVE-2025-14095CVE-2025-14097