Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Oracle October 2021 Critical Patch Update Addresses 231 CVEs

Oracle addresses 231 CVEs in its final quarterly update of 2021 with 419 patches, including 36 critical updates.

Background

On October 19, Oracle released its Critical Patch Update (CPU) for October 2021, the fourth and final quarterly update of the year. This CPU contains fixes for 231 CVEs in 419 security updates across 28 Oracle product families. Out of the 419 security updates published this quarter, 8.6% of patches were assigned a critical severity. High severity patches accounted for the bulk of security patches at 47.3%, followed by medium severity patches at 40.6%.

This quarter’s update includes 36 critical patches across 19 CVEs.

Severity Issues Patched CVEs
Critical 36 19
High 170 78
Medium 198 120
Low 15 14
Total 419 231

Analysis

This quarter, the Oracle Communications product family contained the highest number of patches at 71, accounting for 17% of the total patches, followed by Oracle MySQL at 66 patches, which accounted for 15.8% of the total patches.

In addition to the 28 product families that received security patches this quarter, Oracle did not include security patches for four product families:

  • Oracle Global Lifecycle Management
  • Oracle NoSQL Database
  • Oracle Spatial Studio
  • Oracle SQL Developer

While these four product families did not receive security patches, Oracle notes that there are third-party patches included as part of its CPU release:

Product Family Component Third-Party Library CVE
Global Lifecycle Management Patch Installer Apache Commons Compress CVE-2021-36090
Global Lifecycle Management Patch Installer Apache Commons Compress CVE-2021-35515
Global Lifecycle Management Patch Installer Apache Commons Compress CVE-2021-35516
Global Lifecycle Management Patch Installer Apache Commons Compress CVE-2021-35517
Global Lifecycle Management Patch Installer jackson-databind CVE-2020-25649
NoSQL Database Administration Go CVE-2021-34558
NoSQL Database Administration Netty CVE-2021-21409
Spatial Studio Install Apache Commons IO CVE-2021-29425
Spatial Studio Install Apache Commons BeanUtils CVE-2019-10086
SQL Developer Infrastructure Apache PDFBox CVE-2021-27807

A full breakdown of the patches for this quarter can be seen in the following table, which also includes a count of vulnerabilities that can be exploited over a network without authentication.

Oracle Product Family Number of Patches Remote Exploit without Auth
Oracle Communications 71 35
Oracle MySQL 66 10
Oracle Financial Services Applications 44 22
Oracle Fusion Middleware 38 23
Oracle Retail Applications 26 15
Oracle Communications Applications 19 17
Oracle E-Business Suite 18 3
Oracle PeopleSoft 17 1
Oracle Insurance Applications 16 8
Oracle Java SE 15 8
Oracle Construction and Engineering 12 9
Oracle JD Edwards 11 5
Oracle Database Server 9 8
Oracle Enterprise Manager 8 8
Oracle Virtualization 8 8
Oracle Health Sciences Applications 6 0
Oracle Hyperion 6 4
Oracle Siebel CRM 6 5
Oracle Essbase 5 4
Oracle Supply Chain 5 1
Oracle Systems 5 5
Oracle Commerce 2 3
Oracle GoldenGate 1 2
Oracle Graph Server and Client 1 0
Oracle REST Data Services 1 1
Oracle Secure Backup 1 1
Oracle Hospitality Applications 1 1
Oracle Utilities Applications 1 0
Oracle Global Lifecycle Management 0 0
Oracle NoSQL Database 0 0
Oracle Spatial Studio 0 0
Oracle SQL Developer 0 0

Highest severity flaw in Oracle Essbase

The highest rated vulnerability in this quarter’s Oracle CPU was CVE-2021-35652, a vulnerability in Oracle Essbase, a business analytics solution. The flaw resides in Essbase Administration Services and requires no privileges to exploit. It was disclosed, along with four other vulnerabilities in this CPU by Guillaume Jacques, Paul Barbé and Théo Louis-Tisserand of synacktiv.

Solution

Customers are advised to apply all relevant patches in this quarter’s CPU. Please refer to the October 2021 advisory for full details.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 30-day trial of Tenable.io Vulnerability Management.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.