CVE-2026-34289
Unauthorized Access via Network in Oracle Identity Manager Connector
Publication date: 2026-04-21
Last updated on: 2026-04-23
Assigner: Oracle
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oracle | identity_manager_connector | 12.2.1.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an unauthenticated attacker with network access via HTTPS to gain unauthorized access to critical data or all data accessible by the Oracle Identity Manager Connector. Such unauthorized access to sensitive or critical data can potentially lead to non-compliance with data protection regulations and standards such as GDPR and HIPAA, which require strict controls to protect personal and sensitive information.
However, the provided information does not explicitly mention the impact on compliance with specific standards or regulations.
Can you explain this vulnerability to me?
This vulnerability exists in the Oracle Identity Manager Connector product of Oracle Fusion Middleware, specifically in version 12.2.1.4.0. It is a difficult to exploit flaw that allows an unauthenticated attacker with network access via HTTPS to compromise the Oracle Identity Manager Connector.
Successful exploitation can lead to unauthorized access to critical data or complete access to all data accessible through the Oracle Identity Manager Connector.
How can this vulnerability impact me? :
If exploited, this vulnerability can result in unauthorized access to critical data within the Oracle Identity Manager Connector. This means sensitive information could be exposed or compromised without proper authorization.