Quick Look: CVE-2026-34286, Critical Unauthenticated Access Flaw in Oracle Identity Manager Connector

A brief summary of CVE-2026-34286, a CVSS 9.1 vulnerability in Oracle Identity Manager Connector that allows unauthenticated attackers to read and modify critical identity data over HTTPS. Includes patch information from Oracle's April 2026 CPU.

CVE Analysis

6 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-04-21

Quick Look: CVE-2026-34286, Critical Unauthenticated Access Flaw in Oracle Identity Manager Connector
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Oracle's April 2026 Critical Patch Update quietly addressed a cluster of critical vulnerabilities in the Oracle Identity Manager Connector, and CVE-2026-34286 stands out with a CVSS 3.1 score of 9.1 due to its unauthenticated, network exploitable nature. For organizations running Oracle Fusion Middleware with identity management connectors, this flaw allows a remote attacker to read and manipulate all identity data accessible by the connector without ever presenting credentials.

Oracle Identity Manager Connector is a component within Oracle Fusion Middleware that bridges Oracle Identity Manager to external target systems (directories, databases, applications) for automated identity provisioning and lifecycle management. It is widely deployed in enterprise environments that rely on Oracle's identity governance stack, particularly in financial services, government, and large enterprises managing thousands of user identities. A vulnerability in this component has direct implications for the integrity of identity provisioning workflows and the confidentiality of identity data flowing between systems.

Technical Information

The vulnerability resides in the Core component of the Oracle Identity Manager Connector within the Oracle Fusion Middleware suite. Oracle describes exploitation as easily achievable for an unauthenticated attacker who has network access to the system via HTTPS. Any exposed endpoint handling HTTPS traffic for the connector can be targeted directly without the need for prior credential compromise or internal system access.

CVSS 3.1 Vector Analysis

The full CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, which breaks down as follows:

MetricValueImplication
Attack VectorNetworkExploitable remotely over HTTPS without local access
Attack ComplexityLowNo special conditions or race conditions needed
Privileges RequiredNoneNo prior authentication or user credentials needed
User InteractionNoneExecutes without any action from a legitimate user
ScopeUnchangedImpact confined to the vulnerable component
Confidentiality ImpactHighComplete unauthorized access to critical data
Integrity ImpactHighUnauthorized creation, deletion, or modification of data
Availability ImpactNoneSystem remains operational, making attacks stealthy

Attack Characteristics

The combination of High Confidentiality and High Integrity impacts with no Availability impact is particularly noteworthy from a detection standpoint. An attacker can silently exfiltrate or alter identity data without triggering typical downtime or service degradation alerts. In an identity management context, this means user accounts could be created, privileges escalated, or identity records modified without obvious operational disruption.

Oracle has not published detailed technical descriptions of the root cause beyond the advisory metadata. However, the attack characteristics (unauthenticated, network accessible via HTTPS, targeting the Core component) indicate a flaw in how the connector processes or authorizes incoming HTTPS requests at a fundamental level. The fact that sibling CVEs CVE-2026-34285 and CVE-2026-34287 share identical CVSS scores, the same affected version, and the same attack profile suggests a systemic issue within the Core component's request handling or authorization logic rather than an isolated bug.

Broader Vulnerability Cluster

CVE-2026-34286 is one of at least seven CVEs patched in the Oracle Identity Manager Connector's Core component in the April 2026 CPU:

CVECVSS ScoreProtocolNotes
CVE-2026-342859.1HTTPSIdentical attack profile to CVE-2026-34286
CVE-2026-342869.1HTTPSThis vulnerability
CVE-2026-342879.1HTTPSIdentical attack profile to CVE-2026-34286
CVE-2026-342885.9HTTPSHigher attack complexity required
CVE-2026-342895.9HTTPSHigher attack complexity required
CVE-2026-342907.5TCPDenial of service vector
CVE-2026-342945.9LDAPRequires low privileges

This clustering strongly suggests Oracle undertook a broader security audit and remediation effort across the Identity Manager Connector's core, uncovering multiple related issues.

Patch Information

Oracle addressed CVE-2026-34286 in its April 2026 Critical Patch Update (CPU), released on April 21, 2026. This quarterly CPU collectively addresses 483 new security patches across a wide range of Oracle products.

The sole affected version is 12.2.1.4.0 of the Oracle Identity Manager Connector. As is standard with Oracle CPUs, the specific patch binaries are not publicly available; they are distributed through My Oracle Support (MOS). Oracle does not publish open source diffs or detailed technical descriptions of the fix beyond the advisory metadata.

Customers with active Oracle support contracts should apply the April 2026 CPU patch set for Oracle Fusion Middleware 12.2.1.4.0 to remediate this vulnerability. Given the cluster of related CVEs in the same component, applying the full CPU rather than individual patches is strongly recommended.

Prioritization guidance:

  1. Instances reachable via the public internet over HTTPS should be patched immediately.
  2. Internally accessible instances should follow as soon as possible.
  3. While patches are being deployed, increase monitoring of audit logs for unusual identity lifecycle events such as unexpected account creations, privilege escalations, or bulk data modifications.
  4. Security operations centers should watch for anomalous HTTPS traffic directed at Oracle Identity Manager Connector endpoints.

Affected Systems and Versions

The vulnerability affects a single version:

  • Product: Oracle Identity Manager Connector
  • Component: Core
  • Product Family: Oracle Fusion Middleware
  • Affected Version: 12.2.1.4.0
  • Protocol: HTTPS

Other Oracle Fusion Middleware products patched in the same April 2026 CPU (and worth reviewing for co deployment) include:

  • Oracle Identity Manager: versions 12.2.1.4.0, 14.1.2.0.0, 14.1.2.1.0
  • Oracle Access Manager: version 14.1.2.0.0
  • Oracle WebLogic Server: versions 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0, 15.1.1.0.0

Vendor Security History

The April 2026 CPU addresses 483 new security patches across Oracle's product portfolio, which is consistent with the scale of Oracle's quarterly patch cycles. The presence of seven related CVEs in the Oracle Identity Manager Connector's Core component alone within a single CPU suggests this was the result of a focused security review of the connector's codebase. Oracle's advisory language ("Oracle strongly recommends that customers apply Critical Patch Update security patches as soon as possible") reflects the vendor's standard urgency guidance for critical severity issues.

References

Detect & fix
what others miss

Security magnifying glass visualization