Every quarter, Oracle releases a Critical Patch Update (CPU) that contains a collection of fixes for various security vulnerabilities. These patches are designed to address potential security threats in Oracle's products, encompassing code-related issues and third-party components. Regularly applying these updates helps ensure the security and stability of Oracle's offerings.
This quarter's update includes 387 new security patches across a range of Oracle products, as well as 218 vulnerabilities that are particularly concerning because they may be remotely exploitable without authentication (over a network without requiring user credentials to access); therefore, we strongly recommend customers to apply CPU fixes as soon as possible and prioritise these patches.
Below is a list of affected products and the number of identified vulnerabilities for each. If you use any of these products, it’s essential you take the necessary action to address the potential vulnerabilities in your estate. But don’t worry, DSP is here to help. Organisations frequently approach us at this time to utilise our Oracle Consultancy services and stay on top of their patches. So, please get in touch if this is an area of concern for you.
The number in bold = the number of security patches
The numbers in (brackets) = the number of vulnerabilities
While the sight of a lengthy list of vulnerabilities can be overwhelming, ensuring the security of your hardware and applications is crucial. Staying proactive and keeping up with Critical Patch Updates will help safeguard your environment. Here is the list for details on all the patches. Your system's safety is our priority.