Oracle this week announced the release of 390 new security fixes as part of the April 2021 Critical Patch Update (CPU), including patches for more than 200 bugs that could be exploited remotely without authentication.
The quarterly set of security patches addresses a total of 41 vulnerabilities considered critical severity, including 5 that feature a CVSS score of 10.
The most severe of these vulnerabilities could be exploited to execute code remotely within the context of the vulnerable applications, potentially resulting in full system compromise.
Oracle’s E-Business Suite received patches for the largest number of security holes, namely 70. Of these, 22 could be exploited remotely by unauthenticated attackers, Oracle reveals.
MySQL was also highly impacted, with patches for 49 vulnerabilities, 10 of which could be exploited remotely without authentication. Fusion Middleware and Retail Applications also received fixes for a large number of security issues, namely 45 (36 remotely exploitable without authentication) and 33 (31 exploitable by remote, unauthenticated attackers), respectively.
Only 5 of the 24 flaws patched in Oracle Virtualization could be exploited by remote attackers without authentication, but two of them carry a CVSS score of 10 (CVE-2021-2177 and CVE-2021-2248).
Three other bugs featuring the highest CVSS score possible were addressed in ZFS Storage Appliance Kit (CVE-2020-1472), Cloud Infrastructure Storage Gateway (CVE-2021-2317) and Storage Cloud Software Appliance (CVE-2021-2256).
Other Oracle products that received patches in this CPU include Communications, PeopleSoft, Financial Services Applications, JD Edwards, Database, Communications Applications, Construction and Engineering, Enterprise Manager, and Siebel CRM.
Organizations are advised to review Oracle’s quarterly patches and apply the necessary software updates as soon as possible, to ensure they remain protected from potential attacks. Oracle says it periodically receives reports of attacks targeting old vulnerabilities for which patches are already available.
Applying the principle of least privilege, educating users on phishing and the threat posed by links and attachments in emails, keeping systems updated at all times, and running software as non-privileged users should help mitigate cyber-attacks.
Related: Oracle’s January 2021 CPU Contains 329 New Security Patches
Related: Recent Oracle WebLogic Vulnerability Exploited to Deliver DarkIRC Malware
Related: Oracle’s October 2020 CPU Contains 402 New Security Patches

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
