Oracle's April CPU: 450 Patches, Over 300 Remote, Unauthenticated Flaws
Oracle has dropped its April Critical Patch Update (CPU), delivering a significant batch of 481 security fixes across 28 product families. Of particular concern are the over 300 vulnerabilities that allow for remote exploitation without requiring any authentication. This sheer volume of unauthenticated flaws presents a wide attack surface for adversaries targeting Oracle systems.
For defenders, this underscores the critical need for prompt patching. Ignoring these updates means leaving the digital front door wide open for attackers who can exploit these weaknesses with minimal effort. Organizations running Oracle products must prioritize these patches to mitigate the risk of immediate compromise.
What This Means For You
- If your organization utilizes Oracle products, you must immediately assess the applicability of these 481 patches, especially the 300+ that are remotely exploitable and unauthenticated. Prioritize patching these systems within the shortest possible window to prevent attackers from gaining unauthorized access.
Related ATT&CK Techniques
๐ก๏ธ Detection Rules
3 rules ยท 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free โ export to any SIEM format via the Intel Bot.
Oracle WebLogic Unauthenticated RCE via Deserialization
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| Oracle-CPU-April-2026 | Multiple Vulnerabilities | Oracle products across 28 product families |
| Oracle-CPU-April-2026 | RCE | Over 300 remotely exploitable, unauthenticated flaws |