Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Oracle Releases 433 New Security Patches With April 2023 CPU

Oracle’s April 2023 critical patch update (CPU) includes 433 new security patches, including more than 70 that fix critical vulnerabilities.

Oracle on Tuesday announced the release of 433 new patches as part of its quarterly set of security updates, including more than 70 fixes for critical-severity vulnerabilities.

More than 250 of the addressed vulnerabilities can be exploited remotely and without authentication. Some of the resolved bugs impact multiple products.

For the third quarter in a row, Oracle Communications received the largest number of security patches, at 77. Of the addressed vulnerabilities, 65 can be exploited by remote, unauthenticated attackers. A total of 27 flaws have a ‘critical’ severity rating.

Financial Services Applications also received many security patches this month, at 76. According to Oracle’s advisory, 59 of the resolved bugs can be exploited by attackers over the network, with no user credentials needed.

Oracle also released 49 new patches for Fusion Middleware, including fixes for 44 issues that are remotely exploitable without authentication.

Other Oracle applications that received numerous patches include MySQL (34 patches – 11 remotely exploitable, unauthenticated vulnerabilities), Retail Applications (22 – 16), Analytics (20 – 12), Communications Applications (18 – 13), JD Edwards (14 – 8), Virtualization (11 – 1), HealthCare Applications (10 – 8), PeopleSoft (10 – 8), Health Sciences Applications (10 – 3), and Insurance Applications (9 – 9).

Oracle also released patches for Java SE, Blockchain Platform, Commerce, Siebel CRM, Systems, Database, Essbase, Construction and Engineering, Utilities Applications, Enterprise Manager, E-Business Suite, iLearning, Supply Chain, GoldenGate, SQL Developer, Hyperion, Graph Server and Client, NoSQL Database, REST Data Services, and Hospitality Applications.

For many of these applications, the tech giant’s patches also address vulnerabilities in third-party dependencies.

Advertisement. Scroll to continue reading.

Customers are advised to apply the available patches as soon as possible. Unpatched Oracle applications are known to have been exploited in malicious attacks.

“Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible,” the tech giant notes.

Related: Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication

Related: Oracle’s First Security Update for 2023 Includes 327 New Patches

Related: Oracle Fusion Middleware Vulnerability Exploited in the Wild

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

Network security policy management firm FireMon has appointed Alex Bender as Chief Marketing Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.