Oracle January 2026 Critical Patch Update Fixes 336 Vulnerabilities Including CVSS 10.0 Fusion Middleware Flaw
Oracle has released its January 2026 Critical Patch Update (CPU), addressing 336 new security vulnerabilities across its enterprise software portfolio. Among the most severe is a maximum-severity flaw in Oracle Fusion Middleware that could allow attackers to seize complete control of affected servers without authentication.
The Critical Flaw
The vulnerability, tracked as CVE-2026-21962, carries a CVSS score of 10.0—the highest possible severity rating. It affects the Oracle HTTP Server and WebLogic Server Proxy Plug-in, critical components used to bridge web traffic to backend applications in enterprise environments.
The flaw is remotely exploitable without authentication, meaning attackers can compromise vulnerable systems over the network without requiring any credentials. Affected versions include Oracle HTTP Server 12.2.1.4.0 and 14.1.2.0.0, as well as WebLogic Server Proxy Plug-in versions 12.2.1.4.0, 14.1.1.0.0, and 14.1.2.0.0.
Additional CVSS 10.0 Vulnerabilities
Oracle Fusion Middleware isn't the only product family with maximum-severity flaws. The January CPU also addresses CVSS 10.0 vulnerabilities in:
- Oracle Commerce (Guided Search and Platform, version 11.4.0)
- Oracle Communications (multiple products)
- Oracle PeopleSoft (Enterprise PeopleTools versions 8.60, 8.61, 8.62)
Scope of the Update
The 336 patches span virtually every major Oracle product line:
| Product Family | New Patches | Max CVSS |
|---|---|---|
| Oracle Communications | 56 | 10.0 |
| Oracle Fusion Middleware | 52 | 10.0 |
| Oracle Financial Services | 38 | 9.1 |
| Oracle MySQL | 20 | 9.8 |
| Oracle Siebel CRM | 14 | 9.8 |
| Oracle Retail Applications | 14 | 8.8 |
| Oracle Virtualization | 14 | 8.2 |
| Oracle PeopleSoft | 12 | 10.0 |
| Oracle Hyperion | 12 | 9.1 |
| Oracle Java SE | 11 | 7.5 |
Of the 52 Fusion Middleware vulnerabilities, 47 are remotely exploitable without authentication. Oracle Communications fares similarly, with 34 of its 56 flaws exploitable without credentials.
Recommendations
Oracle strongly recommends applying patches immediately. Organizations running Oracle HTTP Server, WebLogic Server, or any affected Fusion Middleware components should prioritize patching given the unauthenticated remote exploitation vector.
Administrators should review the full advisory for product-specific patch availability and consult Oracle's support documentation for deployment guidance.