Oracle scolds customers for ignoring critical patches
Company claims many actively exploited vulnerabilities should have already been fixed


Oracle has issued a strong rebuke to customers over their failure to update their systems regularly, following a number of reports showing exploits of vulnerabilities that should have already been patched.
The software company has issued the strongly-worded message to customers as part of another wave of patches, some 334 fixes in total, 43 of which are deemed critical, that it hopes will be applied immediately.
RELATED RESOURCE
These have been bundled into the company's routine ‘critical patch update’ which is released to customers once per quarter, with the next scheduled round of updates due on 14 April.
“Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches,” the firm said in a statement. “In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches.
“Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.”
The firm has urged customers to apply the trove of fixes to their products due to the very real threat posed by a successful attack. The products affected by the critical bugs include, but aren’t limited to, Enterprise Manager, MySQL and various software categorised under ‘Oracle Supply Chain Products’.
Companies may be able to reduce the risk of attack in the meantime by blocking network protocols required by an attack, or by removing access privileges from individuals for which these privileges aren’t essential.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Both approaches, however, may also break functionality in certain products, so the company has recommended that customers test these workarounds only systems where they are absolutely necessary.
The importance of patching systems has been highlighted in no uncertain terms by various security horror stories, including the Equifax disaster.
The 2017 data breach was, in part, enabled by a lackadaisical approach to patching IT, namely that 8,500-plus patches were overdue to be applied to internal and external systems.
Oracle’s warning also echoes an analysis conducted in November 2019 regarding the infamous BlueKeep vulnerability.
The research showed that despite the fact the first exploitations for the Microsoft bug were released into the wild, businesses were no more or less motivated to apply necessary fixes than they had been previously.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
From phone calls to roll calls: 3CX has the answer
How Yellowgrid, a 3CX Platinum distributor, has taken advantage of 3CX Phone System’s customisable nature to create a time-saving solution already embraced by over 100 UK schools
-
What is operational technology – and why is it at risk?
Explainer As operational technology becomes more connected, securing it from cyber threats is more urgent than ever
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networks
News Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?
News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances