Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Oracle Releases July 2021 CPU With 342 Security Patches

Oracle on Tuesday announced the availability of a total of 342 new security patches as part of its July 2021 Critical Patch Update (CPU). More than half of the addressed vulnerabilities could be exploited remotely without authentication.

Oracle on Tuesday announced the availability of a total of 342 new security patches as part of its July 2021 Critical Patch Update (CPU). More than half of the addressed vulnerabilities could be exploited remotely without authentication.

Of all the vulnerabilities, approximately 50 are considered critical severity, with one of them featuring a CVSS score of 10, Oracle reveals in its advisory.

The most severe of these issues is CVE-2021-2244, a security bug in the Essbase Analytic Provider Services product of Oracle Essbase (JAPI) that could be exploited remotely without authentication and which could lead to the complete takeover of the affected product.

“Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Essbase Analytic Provider Services. While the vulnerability is in Essbase Analytic Provider Services, attacks may significantly impact additional products,” Oracle explains.

Fusion Middleware received the largest number of patches in this quarterly set of updates, to address a total of 48 vulnerabilities, including 35 that could be exploited by remote, unauthenticated attackers. Of these, 9 are critical-severity bugs, with CVSS scores of 9.8 and 9.9.

Other Oracle software to receive patches for a large number of vulnerabilities in the July 2021 CPU include MySQL (41 addressed issues – 10 of them exploitable remotely without authentication); Communications Applications (33 bugs – 22 remotely exploitable); Communications (26 – 23); Retail Applications (23 – 15); Financial Services Applications (22 – 17); E-Business Suite (17 – 3); and Database Server (16 – 1).

Other Oracle applications to have received patches this month include PeopleSoft, Systems Risk, Commerce, Construction and Engineering, Essbase, JD Edwards, Enterprise Manager, Java SE, Hyperion, and Virtualization, among others.

According to Oracle, the available workarounds include blocking network protocols that attackers may exploit. In some cases, removing privileges that are required for an attack to be successful should also mitigate the risks.

Advertisement. Scroll to continue reading.

Overall, however, Oracle urges customers to apply the available patches as soon as possible, as this would significantly reduce the threat posed by successful attacks. The tech giant also points out that it periodically receives reports of malicious targeting of vulnerabilities for which security patches were released in the past, but which remain unpatched by customers.

“Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay,” the company notes.

Related: Oracle Delivers 390 Security Fixes With April 2021 CPU

Related: Oracle’s January 2021 CPU Contains 329 New Security Patches

Related: Recent Oracle WebLogic Vulnerability Exploited to Deliver DarkIRC Malware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

The US arm of networking giant TP-Link has appointed Adam Robertson as Director of Information and Security.

Raj Dodhiawala has been named Chief Product Officer at Eclypsium.

Cyber exposure management firm Armis has promoted Alex Mosher to President.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.