On April 02, 2025, Oracle released the Vulnerability Detection service as part of Database Management in OCI. It empowers DBAs, architects, and security teams to detect and mitigate risks before they become threats. In this post, let us walk through the end-to-end setup of Vulnerability Detection, how to run assessments, and interpret the findings.

But wait! What if you are already using Vulnerability Framework in OEM or, already leveraging the patch recommendations available on the OCI console in case of ExaCC or ExaCS? I had these exact questions pop-up in my mind so, I will go through these details as well as what makes sense and where. Yes, I know ExaCS is now “Exadata Database Service on Dedicated Infrastructure”. 😊

What is Vulnerability Detection?

It is a part of the “Database Management service” offered by Oracle Cloud Infrastructure. Its job is simple: it checks your Oracle Databases for any known vulnerabilities by looking at:

  • Database version
  • Applied patches, and
  • Configuration settings

The assessment results are then compared against the Oracle Critical Patch Update (CPU) advisories and Oracle recommended best practices.

Step-by-Step Implementation

Prerequisites

Note: If you have discovered a database as part of Stack Monitoring, these steps are already performed and you should see the discovered database under “Managed Databases” with Status “Connected”. You should directly go to “Enable Vulnerability Detection”.

To turn on Vulnerability Detection:

  1. Management Agent installation must be completed for external databases. (I will cover this in detail as part of the Stack Monitoring blogpost)
  2. Register external database.
  3. Connect the external database.
  4. Enable Database Management for the database.
  5. Ensure your user has required IAM permissions, including:
    • DATABASE_MANAGEMENT_WORK_REQUEST_READ
    • DATABASE_MANAGEMENT_VULNERABILITY_ASSESSMENT_EXECUTE

Register an External Database:

  1. Go to OCI Console → Observability & Management → Database Management → Administration.
  2. Click on “Register External Database”.
  3. Click on Container/ Non-container database
  4. Choose the right compartment, provide a user-friendly display name and click on Register.
  5. Once registered, create a database connection handle and connect the Oracle database.

Enable Database Management:

  1. Go to OCI Console → Oracle Databases.
  2. Select your Autonomous or External Database.
  3. Under Resources, click Database Management.
  4. Click Enable and choose the license type.

Note: Autonomous Databases have this enabled by default.

Enable Vulnerability Detection:

  1. Go to OCI Console → Observability & Management → Database Management → Administration → Managed Databases.
  2. Select your Autonomous or External Database.
  3. Click on “Enable” link under Vulnerability Management.
  4. On the next screen, select the database connector, choose the license option (License included in most cases) and click on Next.
  5. Once you review the settings, click on Submit.

Note: In case of a container database, this option is only available for a CDB and not PDBs.

And, that’s it! Once the Vulnerability Management is enabled, the vulnerability statistics are collected every 24 hours via the Management Agent. You however, have an option to run up to 3 On-Demand scans after 30-minutes or so, in a 24-hour period.

Interpreting Results:

Once either the on-demand or scheduled scan is complete:

  1. Go to Vulnerability Detection tab.
  2. Click on the latest assessment.

You’ll see:

  • High, Medium, and Low risk findings.
  • Details of unapplied patches, unsupported database versions, and misconfigurations.

Each finding includes:

  • Description
  • CVE Identifier (if applicable)
  • Recommendation (patch link or config advice)

Notifications and Automation

You can use OCI Events + Notifications to receive alerts when:

  • A new vulnerability is found
  • Assessments are complete or
  • A schedule fails

How is this different from the Patch Recommendations in ExaCC or ExaCS?

The Vulnerability Detection service in OCI Database Management and the Patch Recommendation for Exadata Cloud@Customer (ExaCC) and Exadata Database Service on Dedicated Infrastructure (ExaCS) both have an impact on patching and security, but they are complementary tools with different scopes and workflows.

Here’s a breakdown of how they differ:

Purpose and Scope

FeatureVulnerability Detection (OCI Database Management)Patch Recommendations (ExaCC/ExaCS)
Primary GoalDetect vulnerabilities using Oracle CPUs and security best practicesRecommend and plan database/home patches for ExaCC/ExaCS targets
ScopeAssesses DB version, patch level, config for CVEs and Oracle security risksEvaluates target environment to generate patching strategy
TargetAutonomous DB, External DBs, and DBCS (VM/BM)Specifically for Exadata-based databases (ExaCC/ExaCS)
Type of DetectionSecurity-focused (CVEs, misconfigurations)Lifecycle and compliance-based (patch drift, PSU updates)

Technology and Data Sources

Vulnerability Detection pulls data from:

  • Oracle CVE bulletins
  • Oracle best practice baselines
  • DB configuration (via agent/telemetry)

Patch Recommendations pulls data from:

  • Fleet Patching and Provisioning (FPP) or DB Homes
  • Patch Advisor tooling on the Exadata infrastructure
  • Lifecycle metadata for patch planning and staging

Update Frequency

FeatureUpdate Frequency
Vulnerability DetectionContinuously updated with new CVEs and advisories; assessments can be run on-demand or scheduled
Patch RecommendationsBased on Oracle’s quarterly Critical Patch Updates (CPUs); updates per patch cycle or DB home

Actions and Automation

CapabilityVulnerability DetectionPatch Recommendation
View CVEs & misconfigsYesNo
Export assessmentYes (CSV/JSON)No
Direct patch applicationNo (manual patching required)Yes (can trigger patch job)
Notification & IntegrationYes (via OCI Events & Notifications)Yes (part of patch job flow)

When to Use What?

ScenarioUse This
You need to detect and analyze CVEs and config risks in various database types Vulnerability Detection
You want to automatically apply patches to ExaCC/ExaCS DBs and Homes Patch Recommendations
You want security and compliance posture for audit reporting Vulnerability Detection
You want to reduce patch drift across multiple Exadata environments Patch Recommendations

How is it different from OEM Compliance Report/ Framework?

OCI Vulnerability Detection and OEM Compliance Report, both helps in assessing the database posture, however they are different use-cases.

FeatureOCI Vulnerability DetectionOEM Compliance Framework
ScopeFocused on CVEs, security misconfigurations, and patch advisoriesBroader compliance across security, configuration, and custom policies
Target EnvironmentDatabases managed via OCI (Autonomous, External, DBCS)On-premises and hybrid Oracle environments managed via OEM
Data SourcesOracle CVE bulletins, database patch level, and best practicesOracle’s built-in compliance standards + user-defined checks
GranularitySecurity-focused findings (e.g., missing CPU, listener config issues)Deep configuration checks across OS, DB, middleware layers
CustomizationLimited (mostly standardized scan)Highly customizable rules and standards via compliance standards
ExecutionAutomated or on-demand from OCI ConsoleScheduled or on-demand via OEM UI or jobs
AutomationIntegrates with OCI Notifications & EventsIntegrates with corrective actions, EM job system
Output FormatRisk categories, CVE links, patch infoPass/fail status, severity, policy descriptions
Ideal ForCloud-first security teams and DBAs on OCIEnterprise IT, audit teams, regulated environments (e.g., SOX, HIPAA)

Conclusion

OCI’s Vulnerability Detection is new tool to gain a proactive, automated, and Oracle-recommended approach for strengthening databases. Use it alone or in a combination with OEM Compliance Report/ Framework and/ or Patch Recommendations. Hope it helps! Stay tuned for more…


Discover more from IT-Noesis

Subscribe to get the latest posts sent to your email.

Leave a comment