Oracle's Critical Patch Update July 2023

Ben Morris 19-Jul-2023 10:53:17

Every quarter, Oracle releases a Critical Patch Update (CPU) that contains a collection of fixes for various security vulnerabilities. These patches are designed to address potential security threats in Oracle's products, encompassing code-related issues and third-party components. Regularly applying these updates helps ensure the security and stability of Oracle's offerings.

This quarter's update includes 503 new security patches across a range of Oracle products, as well as 353 vulnerabilities that are particularly concerning because they may be remotely exploitable without authentication (over a network without requiring user credentials to access); therefore, we strongly recommend customers to apply CPU fixes as soon as possible and prioritise these patches.


What should I do?

Below is a list of affected products and the number of identified vulnerabilities for each. If you use any of these products, it’s essential you take the necessary action to address the potential vulnerabilities in your estate. But don’t worry, DSP is here to help. Organisations frequently approach us at this time to utilise our Oracle Consultancy services and stay on top of their patches. So, please get in touch if this is an area of concern for you.


List of Identified products and vulnerabilities

The number in bold = the number of security patches

The numbers in (brackets) = the number of vulnerabilities

While the sight of a lengthy list of vulnerabilities can be overwhelming, ensuring the security of your hardware and applications is crucial. Staying proactive and keeping up with Critical Patch Updates will help safeguard your environment. Here is the list for details on all the patches. Your system's safety is our priority.

If you would like any Oracle Database Support or advice on patching, please Contact Us or book a meeting...

Book a Meeting