Oracle on Tuesday announced the release of its latest quarterly Critical Patch Update (CPU), which includes a total of 419 security patches for vulnerabilities across the company’s portfolio.
Just over half of the patches address vulnerabilities that could be exploited remotely without authentication, Oracle announced.
Of the 419 new security patches in the October 2021 CPU, 36 deal with critical vulnerabilities, with one of them featuring a CVSS score of 10. The CPU also addresses 60 vulnerabilities that feature a CVSS score between 8 and 9.
Oracle Communications received the largest number of patches in this CPU, at 71. Of these, 56 vulnerabilities could be exploited remotely without authentication.
MySQL also received a large number of fixes, namely 66. Exploitation of 10 of the addressed issues can be done remotely, without authentication.
Financial Services Applications received 44 security patches (26 of the vulnerabilities could be exploited by remote, unauthenticated attackers), while Fusion Middleware received 38 (30 security holes remotely exploitable without authentication).
Other Oracle software to have received more than ten security fixes includes Retail Applications (26 patches – including 9 flaws remotely exploitable without authentication), Communications Applications (19 – 14), E-Business Suite (18 – 4), PeopleSoft (17 – 8), Insurance Applications (16 – 11), Java SE (15 – 13), Construction and Engineering (12 – 7), and JD Edwards (11 – 8).
Oracle also released security patches for Commerce, Database Server, Essbase, Enterprise Manager, GoldenGate, Graph Server and Client, Health Sciences Applications, Hospitality Applications, Hyperion, REST Data Services, Secure Backup, Siebel CRM, Supply Chain, Systems, Utilities Applications, and Virtualization.
The company announced that, while no new patches were released for Global Lifecycle Management, NoSQL, Spatial Studio, and SQL Developer, updates rolling out for them address third-party vulnerabilities.
Some of the security patches released for other Oracle software address additional vulnerabilities as well, including in third-party components.
As usual, Oracle urges users and administrators to apply the newly released patches in a timely manner, warning that attackers are constantly targeting known vulnerabilities in its products, for which fixes are available.
“In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay,” the company says.
Oracle plans to release the next quarterly CPU on January 18, 2022.
Related: Oracle Releases July 2021 CPU With 342 Security Patches
Related: Oracle Delivers 390 Security Fixes With April 2021 CPU
Related: Oracle’s January 2021 CPU Contains 329 New Security Patches

More from Ionut Arghire
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- US, Israel Provide Guidance on Securing Remote Access Software
- Blumira Raises $15 Million for SMB-Tailored XDR Platform
- KeePass Update Patches Vulnerability Exposing Master Password
- Google Workspace Gets Passkey Authentication
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
