CVE-2026-34287
Unauthenticated Access Vulnerability in Oracle Identity Manager Connector
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | identity_manager_connector | 12.2.1.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Identity Manager Connector product of Oracle Fusion Middleware, specifically in version 12.2.1.4.0. It is an easily exploitable flaw that allows an unauthenticated attacker with network access via HTTPS to compromise the Oracle Identity Manager Connector.
Successful exploitation can lead to unauthorized creation, deletion, or modification of critical data or any data accessible through the Oracle Identity Manager Connector.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated attacker to gain unauthorized creation, deletion, or modification access to critical data within the Oracle Identity Manager Connector. Such unauthorized access and potential data compromise can lead to violations of data protection requirements mandated by common standards and regulations like GDPR and HIPAA, which require strict controls over data confidentiality and integrity.
Because the vulnerability impacts confidentiality and integrity of critical data, organizations using the affected version may face compliance risks if the vulnerability is exploited, potentially resulting in regulatory penalties or breaches of legal obligations.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized access to critical data or complete access to all data accessible via the Oracle Identity Manager Connector.
An attacker can create, delete, or modify critical data without any authentication, potentially compromising the integrity and confidentiality of your data.