{"id":5021,"date":"2026-03-20T11:17:38","date_gmt":"2026-03-20T16:17:38","guid":{"rendered":"https:\/\/cert.pa\/?p=5021"},"modified":"2026-03-20T11:17:39","modified_gmt":"2026-03-20T16:17:39","slug":"csirt-panama-aviso-2026-03-20-oracle-ejecucion-de-codigo-en-remoto-en-oracle","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=5021","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2026-03-20 Oracle: Ejecuci\u00f3n de c\u00f3digo en remoto en Oracle."},"content":{"rendered":"\n<p>Gravedad: Critica&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Fecha de publicaci\u00f3n: marzo 20, 2026<br>\u00daltima revisi\u00f3n: marzo 20, 2026<\/p>\n\n\n\n<p>Sitio web: <a href=\"https:\/\/www.oracle.com\/\">https:\/\/www.oracle.com\/<\/a><\/p>\n\n\n\n<p>Sistemas Afectados:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oracle Identity Manager, versiones 12.2.1.4.0 y 14.1.2.1.0;<\/li>\n\n\n\n<li>Oracle Web Services Manager, versiones 12.2.1.4.0 y 14.1.2.1.0..<\/li>\n<\/ul>\n\n\n\n<ol style=\"list-style-type:upper-roman\" class=\"wp-block-list\">\n<li><strong>Descripci\u00f3n<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Se han publicado un aviso de seguridad, sobre una vulnerabilidad de severidad cr\u00edtica que, en caso de ser explotada, podr\u00eda permitir la ejecuci\u00f3n de c\u00f3digo en remoto.<\/p>\n\n\n\n<p>II. <strong>Impacto<\/strong><\/p>\n\n\n\n<ol style=\"list-style-type:upper-roman\" class=\"wp-block-list\"><\/ol>\n\n\n\n<p><strong>Vulnerabilidad CVE-2026-21992: <\/strong>un atacante no autenticado con acceso a la red por HTTP puede comprometer el dispositivo y lograr ejecutar c\u00f3digo en remoto, lo que impacta negativamente en la confidencialidad, integridad y disponibilidad.<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Actualizar los productos a la \u00faltima versi\u00f3n.<\/p>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>INCIBE CERT. Avisos Seguridad, Ejecuci\u00f3n de c\u00f3digo en remoto en Oracle. 20 de marzo del 2026. Recopilado en: https:\/\/www.incibe.es\/index.php\/incibe-cert\/alerta-temprana\/avisos\/ejecucion-de-codigo-en-remoto-en-oracle<\/li>\n\n\n\n<li>Drupal Oficial. \u00a019 de marzo del 2026. Oracle Security Alert Advisory &#8211; CVE-2026-21992. Recopilado en: https:\/\/www.oracle.com\/security-alerts\/alert-cve-2026-21992.html<\/li>\n<\/ol>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-2378<br>Web: https:\/\/cert.pa<br>X: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: Critica&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fecha de publicaci\u00f3n: marzo 20, 2026\u00daltima revisi\u00f3n: marzo 20, 2026 Sitio web: https:\/\/www.oracle.com\/ Sistemas Afectados: Oracle Identity Manager, versiones 12.2.1.4.0 y 14.1.2.1.0; Oracle Web Services Manager, versiones 12.2.1.4.0 y 14.1.2.1.0.. Descripci\u00f3n Se han&#8230;<\/p>\n","protected":false},"author":7,"featured_media":4962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[43,8,72,37,68],"class_list":["post-5021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-oracle","tag-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5021"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5021\/revisions"}],"predecessor-version":[{"id":5023,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5021\/revisions\/5023"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/4962"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}