Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Oracle Critical Patch Update (AL01/250122/CSIRT-ITA)

Oracle Critical Patch Update (AL01/250122/CSIRT-ITA)

Summary

Oracle has released the January Critical Patch Update that describes 267 vulnerabilities across multiple products, 18 of which are rated “critical.” Some of these vulnerabilities could be exploited to perform unauthorized operations or compromise service availability on target systems.

Risk

Estimate of impact of the vulnerability on the reference community: High (66.53)

Type

  • Denial of Service
  • Remote Code Execution
  • Security Restrictions Bypass
  • Information Disclosure
  • Elevation of Privilege
  • Data Manipulation

Affected products and/or versions

Oracle

  • Analytics
  • Application Express
  • Big Data Spatial and Graph
  • Blockchain Platform
  • Commerce
  • Communications
  • Communications Applications
  • Construction and Engineering
  • Database Server
  • E-Business Suite
  • Enterprise Manager
  • Essbase
  • Financial Services Applications
  • Fusion Middleware
  • GoldenGate
  • Graph Server and Client
  • Health Sciences Applications
  • Hospitality Applications
  • Hyperion
  • Insurance Applications
  • JD Edwards
  • Java SE
  • MySQL
  • PeopleSoft
  • Policy Automation
  • REST Data Services
  • Retail Applications
  • Secure Backup
  • Siebel CRM
  • Supply Chain
  • Systems
  • TimesTen In-Memory Database
  • Utilities Applications
  • Virtualization

Mitigation actions

In line with vendor statements, it is recommended to update products to the latest available version.

For more information on the affected products and intervention methods, we recommend referring to the security bulletin available in the References section.

Below are only the CVEs related to vulnerabilities with a “critical” severity:

CVE
CVE-2016-1000027CVE-2024-38475
CVE-2021-23926CVE-2024-45492
CVE-2023-29824CVE-2024-53677
CVE-2023-3961CVE-2024-5535
CVE-2023-46604CVE-2024-56337
CVE-2024-11053CVE-2025-21524
CVE-2024-23807CVE-2025-21535
CVE-2024-3596CVE-2025-21547
CVE-2024-37371CVE-2025-21556

References

https://www.oracle.com/security-alerts/cpujan2025.html

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services