Oracle this week announced the release of 297 new security fixes as part of its April 2019 Critical Patch Update (CPU), two-thirds of which are remotely exploitable without authentication.
Fifty-three of the fixes patch critical vulnerabilities — with a CVSS score of above 9 — including 49 with a CVSS score of 9.8, Oracle’s advisory reveals.
Impacted products include Database Server, Communications Applications, E-Business Suite, Financial Services Applications, Fusion Middleware, Hospitality Applications, Java SE, MySQL, PeopleSoft Products, Retail Applications, and Virtualization, among others.
Fusion Middleware was impacted the most, with 53 fixes received this month, 42 of which may be remotely exploitable without authentication. Fourteen of these address critical vulnerabilities.
The second most impacted product this month was MySQL, with 45 received patches, including four resolving issues that may be remotely exploitable without authentication. The most severe of the vulnerabilities has a CVSS score of 7.5.
Next in line is the E-Business Suite, with 35 fixes, 33 of which address vulnerabilities that may be remotely exploitable without authentication. Twenty-seven of these feature a “high” severity rating (25 with a CVSS score of 8.2 and 2 with a CVSS score of 8.1).
Communications Applications received patches for 26 bugs, 19 of which may be remotely exploited without authentication. Nine of the vulnerabilities are considered “critical risk” (a CVSS score of 9.8).
This month, Oracle released 24 fixes for Retail Applications, with 20 of the addressed vulnerabilities being remotely exploitable without authentication. Six of the security flaws have a critical severity rating (CVSS score of 9.8).
Other impacted products include Virtualization (15 patches – 3 for flaws remotely exploitable without authentication), Financial Services Applications (14 fixes – 13 remotely exploitable bugs), PeopleSoft Products (12 fixes – 8 remotely exploitable), and Enterprise Manager Products Suite (11 – 7).
Construction and Engineering Suite (8 fixes – 7 remotely exploitable), JD Edwards Products (8 – 7), Siebel CRM (8 – 6), Database Server (6 – 1), Utilities Applications (6 – 5), Hospitality Applications (5 – 5), Java SE (5 – 5), Supply Chain Products Suite (5 – 5), Commerce (3 – 3), Sun Systems Products Suite (3 – 2), Health Sciences Applications (2 – 1), Berkeley DB (1 – 0), Food and Beverage Applications (1 – 1), and Support Tools (1 – 1) received patches as well.
“Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update fixes as soon as possible. Until you apply the Critical Patch Update fixes, it may be possible to reduce the risk of successful attack by blocking network protocols required by an attack,” Oracle says.
Related: Oracle Patches 33 Critical Vulnerabilities With January Updates
Related: Oracle’s October 2018 Update Includes 301 Security Fixes

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
