Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Oracle January 2026 Critical Patch Update Addresses 158 CVEs



A title slide announcing the Oracle Critical Patch Update for January 2026 (Q1). The slide is branded with the Tenable Research Special Operations logo and features a central yellow database icon against a background with colorful striped borders.

Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates.

Key takeaways:

  1. The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates.
     
  2. 27 issues (8% of all patches) were assigned a critical severity rating. 
     
  3. CVE-2026-21945, a high severity Server-Side Request Forgery (SSRF) vulnerability in Oracle Java was discovered by Tenable Research.

Background

On January 20, Oracle released its Critical Patch Update (CPU) for January 2026, the first quarterly update of 2026. This CPU contains fixes for 158 unique CVEs in 337 security updates across 30 Oracle product families. Out of the 337 security updates published this quarter, 8% of patches were assigned a critical severity. High severity patches accounted for the bulk of security patches at 45.7%, followed by medium severity patches at 42.4%.

Pie Chart showing the count of patches released in the Oracle January 2026 Critical Patch Update (CPU)

This quarter’s update includes 27 critical patches across 13 CVEs.

SeverityIssues PatchedCVEs
Critical2713
High15467
Medium14369
Low139
Total337158

Analysis

This quarter, the Oracle Zero Data Loss Recovery Appliance product family contained the highest number of patches at 56, accounting for 16.6% of the total patches, followed by Oracle Enterprise Manager at 51 patches, which accounted for 15.1% of the total patches.

A full breakdown of the patches for this quarter can be seen in the following table, which also includes a count of vulnerabilities that can be exploited over a network without authentication.

Oracle Product FamilyNumber of PatchesRemote Exploit without Auth
Oracle Zero Data Loss Recovery Appliance5634
Oracle Enterprise Manager5147
Oracle E-Business Suite3833
Oracle Java SE207
Oracle MySQL1410
Oracle PeopleSoft1411
Oracle Systems141
Oracle HealthCare Applications1210
Oracle JD Edwards1210
Oracle Hospitality Applications1111
Oracle Retail Applications108
Oracle Commerce87
Oracle Communications82
Oracle Financial Services Applications86
Oracle Database Server72
Oracle TimesTen In-Memory Database76
Oracle Hyperion75
Oracle Analytics66
Oracle GoldenGate53
Oracle Fusion Middleware53
Oracle Siebel CRM51
Oracle Supply Chain54
Oracle Construction and Engineering44
Oracle Health Sciences Applications44
Oracle APEX10
Oracle Essbase11
Oracle Graph Server and Client10
Oracle Key Vault10
Oracle NoSQL Database11
Oracle Secure Backup11

Tenable Research discovery

As part of the January CPU, Oracle addressed CVE-2026-21945, a high severity Server-Side Request Forgery (SSRF) vulnerability in Oracle Java that is remotely exploitable without authentication. When successfully exploited, it can be leveraged to exhaust resources, causing a denial-of-service (DoS) condition. You can read more about the discovery in our blog post and in our Tenable Research Advisory (TRA).

Solution

Customers are advised to apply all relevant patches in this quarter’s CPU. Please refer to the January 2026 advisory for full details.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released. This link uses a search filter to ensure that all matching plugin coverage will appear as it is released.

Get more information

Join Tenable's Research Special Operations (RSO) Team on Tenable Connect and engage with us in the Threat Roundtable group for further discussions on the latest cyber threats.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

× Contact our sales team