Oracle has released its January 2026 Critical Patch Update (CPU), containing 337 new security patches addressing 158 unique CVEs across 122 products from Oracle’s portfolio. The update includes two maximum-severity flaws with CVSS 10.0 scores and 27 issues rated critical severity (8% of all patches).

Patch overview

MetricValue
Total patches337
Unique CVEs158
Products affected122
Critical severity issues27 (8%)
Maximum severityCVSS 10.0
Remotely exploitable (no auth)Multiple critical

Critical vulnerabilities (CVSS 10.0)

Two vulnerabilities received maximum severity scores:

CVEProductDescription
CVE-2025-66516Multiple productsCritical severity affecting multiple components
CVE-2026-21962Oracle HTTP Server, WebLogic Server Proxy Plug-inMaximum risk of remote exploitation

CVE-2026-21962 is particularly concerning as it affects components of Oracle HTTP Server and WebLogic Server Proxy Plug-in—commonly internet-facing infrastructure components.

CVE-2026-21962 details

AttributeValue
CVSS Score10.0 (Critical)
Affected componentsOracle HTTP Server, WebLogic Server Proxy Plug-in
Attack vectorNetwork
Privileges requiredNone
User interactionNone
ImpactRemote exploitation

These maximum-severity vulnerabilities require immediate attention across affected deployments.

High-severity vulnerabilities (CVSS 9.8)

Multiple vulnerabilities affecting third-party components:

ComponentAffected Products
Apache Commons CompressMultiple Oracle products
Eclipse JGitDevelopment tools
OpenJPEGImage processing components

Patches by product family

Product FamilyPatchesNotable
Fusion Middleware45Web-facing components
Financial Services3833 remotely exploitable without auth
E-Business Suite31ERP vulnerabilities
Communications28Telecom platforms
Database24Multiple critical flaws
MySQL19Database server
Java SE11All remotely exploitable without auth
VM VirtualBox11High-risk vulnerabilities
GoldenGate5+3 remotely exploitable without auth

Financial Services Applications

The 38 patches for Oracle Financial Services Applications deserve particular attention:

MetricValue
Total patches38
Remotely exploitable (no auth)33
Attack complexityLow

Why this matters

Financial Services applications:

  • Handle sensitive transaction data
  • Process payments and settlements
  • Manage customer financial information
  • Support banking and insurance operations
  • Are often internet-facing

33 remotely exploitable vulnerabilities without authentication represents significant risk for financial institutions.

Java SE vulnerabilities

MetricValue
New patches11
Remotely exploitableAll 11
Authentication requiredNone
Maximum CVSS score7.5

Notable Java CVEs

CVESeverityType
CVE-2025-433687.5 (High)JavaFX/WebKitGTK component
CVE-2025-74257.5 (High)JavaFX/libxml2 component
CVE-2026-219457.5 (High)Server-Side Request Forgery (SSRF)

CVE-2026-21945 details

AttributeValue
TypeServer-Side Request Forgery (SSRF)
ImpactResource exhaustion, denial of service
AuthenticationNot required
Network exploitableYes

CVE-2026-21945 is a high-severity SSRF vulnerability in Oracle Java that is remotely exploitable without authentication. When successfully exploited, it can be leveraged to exhaust resources, causing a denial-of-service condition.

Java remains ubiquitous in enterprise environments. All 11 Java SE patches address vulnerabilities exploitable remotely without authentication—making them high-priority for any organization running Java applications.

Database vulnerabilities

Multiple critical vulnerabilities affect Oracle Database, potentially enabling:

  • Unauthorized data access
  • Privilege escalation
  • Remote code execution

Organizations running Oracle Database should review the CPU advisory and prioritize patching based on deployment exposure.

VM VirtualBox

11 high-risk vulnerabilities affect Oracle VM VirtualBox. While typically used for development and testing, compromised VirtualBox instances can:

  • Provide pivot points into corporate networks
  • Expose data processed in VMs
  • Enable escape to host systems

Third-party component impact

A significant portion of this CPU addresses vulnerabilities in third-party open-source libraries bundled with Oracle products:

PatternImpact
Shared dependenciesSingle CVE maps to many products
Transitive inclusionVulnerability inherited through dependency chains
Update lagOracle products may bundle older library versions

This explains why 158 unique CVEs result in 337 patches—the same vulnerability affects multiple products through shared components.

Open source component risks

ObservationImplication
Large fraction of fixes address third-party librariesSupply chain risk in enterprise software
Not Oracle-authored codeDependency on upstream security
Shared dependency chainsVulnerability amplification

Exploitation status

StatusDetails
Zero-day exploitationNone confirmed at release
Public PoCsNone disclosed at release
Oracle recommendationImmediate patching due to ongoing exploitation attempts

While no active exploitation was confirmed at release, Oracle strongly recommends immediate patching based on historical patterns of rapid exploit development following CPU releases and ongoing reports of malicious exploitation attempts.

Patching priorities

Tier 1: Immediate (within 72 hours)

TargetReason
Internet-facing systemsDirect attack exposure
Financial Services apps33 unauthenticated remote vectors
Java SE deploymentsAll 11 patches remotely exploitable
CVSS 10.0 vulnerabilitiesMaximum severity
WebLogic ServerCVE-2026-21962 exposure

Tier 2: Urgent (within 1 week)

TargetReason
Database systemsCritical data exposure risk
E-Business SuiteERP compromise impact
Fusion MiddlewareWeb component exposure

Tier 3: Standard (within patch cycle)

TargetReason
Internal-only systemsReduced exposure
Development environmentsLower impact
Non-critical applicationsBusiness risk assessment

Implementation guidance

StepAction
1Download patches from My Oracle Support
2Review CPU advisory for affected products
3Test patches in non-production environment
4Prioritize based on exposure and criticality
5Deploy to production during maintenance window
6Verify successful installation
7Monitor for exploitation attempts
8Document exceptions for delayed patching

Temporary mitigations

If immediate patching isn’t possible:

ControlPurpose
Network segmentationLimit access to vulnerable systems
WAF rulesBlock known attack patterns
Enhanced monitoringDetect exploitation attempts
Access restrictionsReduce authenticated attack surface
Disable unused featuresReduce attack surface

CPU schedule reminder

Oracle releases Critical Patch Updates quarterly:

MonthTypical Release
JanuarySecond Tuesday
AprilSecond Tuesday
JulySecond Tuesday
OctoberSecond Tuesday

Organizations should plan patching cycles around this schedule, with processes to evaluate and deploy updates promptly.

Historical comparison

CPUTotal PatchesUnique CVEs
January 2026337158
October 2025349162
July 2025318149
April 2025308145

The January 2026 CPU is consistent with recent update volumes, reflecting Oracle’s extensive product portfolio.

Recommendations

For Oracle customers

PriorityAction
CriticalApply CVSS 10.0 patches immediately
CriticalPrioritize Java SE and Financial Services patches
HighReview internet-facing system exposure
HighImplement compensating controls for delayed patching
OngoingEstablish quarterly CPU response procedures

For security teams

PriorityAction
HighInventory all Oracle deployments
HighMap critical systems to CPU advisory
MediumValidate patch testing procedures
OngoingMonitor for post-CPU exploit releases

Context

The January 2026 CPU’s 337 patches reflects both Oracle’s extensive product portfolio and the challenge of securing complex enterprise software with numerous third-party dependencies.

The concentration of remotely exploitable, unauthenticated vulnerabilities in Financial Services (33) and Java SE (11) applications demands immediate attention from affected organizations. These aren’t theoretical risks—they’re attack vectors that require no credentials and can be exploited from the network.

The significant proportion of patches addressing third-party open-source components highlights supply chain security as a growing concern in enterprise software. Organizations running Oracle products should treat CPU releases as security-critical events requiring prompt assessment and remediation, not routine maintenance to be scheduled around convenience.