Oracle scolds customers for ignoring critical patches
Company claims many actively exploited vulnerabilities should have already been fixed
Oracle has issued a strong rebuke to customers over their failure to update their systems regularly, following a number of reports showing exploits of vulnerabilities that should have already been patched.
The software company has issued the strongly-worded message to customers as part of another wave of patches, some 334 fixes in total, 43 of which are deemed critical, that it hopes will be applied immediately.
Patch management best practices
Reduce your patch management workloadDownload now
These have been bundled into the company's routine ‘critical patch update’ which is released to customers once per quarter, with the next scheduled round of updates due on 14 April.
“Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches,” the firm said in a statement. “In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches.
“Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.”
The firm has urged customers to apply the trove of fixes to their products due to the very real threat posed by a successful attack. The products affected by the critical bugs include, but aren’t limited to, Enterprise Manager, MySQL and various software categorised under ‘Oracle Supply Chain Products’.
Companies may be able to reduce the risk of attack in the meantime by blocking network protocols required by an attack, or by removing access privileges from individuals for which these privileges aren’t essential.
Both approaches, however, may also break functionality in certain products, so the company has recommended that customers test these workarounds only systems where they are absolutely necessary.
The importance of patching systems has been highlighted in no uncertain terms by various security horror stories, including the Equifax disaster.
The 2017 data breach was, in part, enabled by a lackadaisical approach to patching IT, namely that 8,500-plus patches were overdue to be applied to internal and external systems.
Oracle’s warning also echoes an analysis conducted in November 2019 regarding the infamous BlueKeep vulnerability.
The research showed that despite the fact the first exploitations for the Microsoft bug were released into the wild, businesses were no more or less motivated to apply necessary fixes than they had been previously.
BIOS security: The next frontier for endpoint protection
Today’s threats upend traditional security measuresDownload now
The role of modern storage in a multi-cloud future
Research exploring the impact of modern storage in defining cloud successDownload now
Enterprise data protection: A four-step plan
An interactive buyers’ guide and checklistDownload now
The total economic impact of Adobe Sign
Cost savings and business benefits enabled by Adobe SignDownload now