Oracle and Cisco Zero-Days: Unauthenticated RCE Targeting Identity and Management Infrastructure
Guidance: Title must contain specific identifiers (CVE-xxxx or Threat Actor name). Never generic.
Oracle Identity Management Cluster (CVE-2026-21992 & CVE-2026-21962)
Confidence: High
Oracle has released emergency security alerts addressing two critical unauthenticated remote code execution (RCE) vulnerabilities. CVE-2026-21992 (CVSS 9.8) affects Oracle Identity Manager, with evidence of zero-day exploitation in the wild. Simultaneously, CVE-2026-21962 (CVSS 10.0) targets the proxy functionality in Oracle WebLogic, allowing full system compromise without credentials.
The exploitation of identity infrastructure represents a Tier-0 threat to UK and EU enterprise environments, potentially allowing attackers to bypass all authentication controls. Given the confirmed zero-day activity, organisations using affected Oracle components must apply the emergency patches immediately and audit for unauthorised account creation or modification.
Cisco Secure FMC Zero-Day (CVE-2026-20131)
Confidence: High
A critical unauthenticated RCE (CVSS 10.0) in Cisco Secure Firewall Management Center (FMC) is being actively exploited. Intelligence indicates the Interlock ransomware group has weaponised this vulnerability since at least 26 January 2026, creating a significant detection blind spot for affected organisations.
The vulnerability allows attackers to gain administrative control over the firewall management platform, potentially facilitating network-wide lateral movement and data exfiltration. Security teams must review Cisco FMC logs back to late January for indicators of compromise (IoCs) and prioritise the deployment of Cisco's remediation guidance.
Juniper Junos OS Evolved PTX RCE (CVE-2026-21902)
Confidence: High
Juniper has disclosed a CVSS 10.0 vulnerability in Junos OS Evolved affecting high-performance PTX series routers. The flaw resides in the 'On-Box Anomaly Detection' framework and allows an unauthenticated attacker to achieve root-level RCE. This poses a direct threat to Critical National Infrastructure (CNI) and ISP-grade hardware in the UK and EU.
Google Chrome Zero-Day (CVE-2026-5281)
Confidence: High
Google has confirmed active exploitation of CVE-2026-5281, a high-severity use-after-free vulnerability in the Dawn graphics library. All managed endpoints must be updated to Chrome version 146.0.7680.177 or later to mitigate this active risk to browser environments.
Update: F5 BIG-IP RCE Reclassification (CVE-2025-53521)
Confidence: High
Update: CVE-2025-53521 has been reclassified from a Denial of Service (DoS) to a critical 9.8 RCE. Active exploitation by the China-nexus group UNC5221 is confirmed; mandatory patching to version 21.0.0 or fixed 17.x releases is required immediately.
Update: EU Commission (Europa.eu) 90GB Data Leak
Confidence: High
Update: The Europa.eu breach has escalated to a massive public leak, with a 90GB archive now circulating on dark web sites. The stolen data includes internal emails and contracts, resulting from a February compromise of staff mobile devices.
Update: Fortinet FortiClient EMS (CVE-2026-21643)
Confidence: High
Update: The confirmed exploitation window for the Fortinet EMS vulnerability has been backdated to 24 March 2026. Organisations should audit logs from this date for SQL injection attempts and verify the installation of patch 7.4.5+.
Update: Axios NPM Trojan (UNC1069)
Confidence: High
Update: Google GTIG has formally attributed the malicious Axios npm packages to the North Korean state-sponsored actor BlueNoroff (UNC1069). Maintainers must audit pinned dependencies and rotate all potentially exposed credentials.
Why This Matters
The simultaneous disclosure of multiple unauthenticated RCEs in core identity and perimeter infrastructure (Oracle, Cisco, F5) indicates a high-intensity period of infrastructure targeting. The reclassification of F5 and the scale of the EU Commission leak further exacerbate the regional threat landscape.
- Recommended Actions
- Apply Oracle emergency patches for Identity Manager and WebLogic immediately.
- Audit Cisco FMC logs back to 26 January 2026 for Interlock ransomware activity.
- Force update Chrome to version 146.0.7680.177+ across all fleets.
- Implement F5 BIG-IP patches following the 9.8 RCE reclassification.
All findings grounded in A13E intelligence sweeps through 04:30 UTC 02 April 2026.