Known issues in OpenEdge 12.2.19
- Last Updated: March 17, 2026
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
Click here for a list of the fixed issues.
The following table lists the release notes for this release:
| Component | Issue Number | Description |
|---|---|---|
| Security | OCTA-80321 |
Important Notice – Breaking Change Do not install OpenEdge 12.2.19 or later before reviewing this information. OpenEdge 12.2.19 introduces a breaking security change that permanently removes support for the OECH1 encoding algorithm. This change is required to remediate a known security vulnerability. Once this update is applied, any use of OECH1‑encoded values will result in runtime errors and may prevent OpenEdge components from running. Progress strongly recommends that a migration plan is created and tested prior to installing this update in production to avoid service disruption. Progress Software strongly recommends taking a full backup of your system before applying the update to manage any migration errors where the update must be restarted. Security Update Overview The OECH1 encoding algorithm, historically used to obfuscate administrative system passwords and sensitive configuration values, has been identified as cryptographically weak and unsuitable for enterprise use. CVE‑2025‑8095 demonstrates that OECH1‑encoded values can be exploited and must be considered compromised. Beginning with OpenEdge 12.2.19, OECH1 is permanently removed across the platform. Key points:
Affected Versions All OpenEdge 12.2.x versions prior to 12.2.19 are subject to this vulnerability. Upgrading to 12.2.19 without first remediating OECH1 usage will result in system startup or runtime failures. Behavior Changes in OpenEdge 12.2.19
This release is not backward compatible with deployments that rely on OECH1. Customer Migration Requirements Customers must identify and replace all customer‑managed OECH1‑encoded values prior to production deployment. Common usage locations include:
Recommended Upgrade Flow to 12.2.19
Finding OECH1 Usage Before upgrading, customers should perform a comprehensive scan of their OpenEdge installation directories to proactively locate OECH1‑encoded values. Configuration files are the most common source of latent OECH1 dependencies that may not surface until specific services are started. After static scanning, runtime testing should be performed to identify any remaining usage reported in OpenEdge or system logs. Security Risk Statement Continuing to use OECH1 significantly weakens the security posture of OpenEdge environments. OECH1‑encoded credentials should be treated as compromised. Re‑encoding historical OECH1 values without changing the underlying secret does not mitigate risk. If attackers obtain earlier OECH1‑encoded values, they may still exploit updated deployments. Customers are advised to:
OpenEdge 12.2.19 is a backward‑incompatible release that introduces a mandatory security remediation. Failure to migrate OECH1‑encoded values before applying this update will result in runtime errors and service outages. Customers must plan and execute migration activities carefully to ensure continued system availability. |
| Install | OCTA-82879 |
Starting with OpenEdge 12.2.19, update releases are delivered as both incremental and complete installations. This means that a previous version of OpenEdge 12.2 does not need to be installed before running the 12.2.19 installer. |
| Install | OCTA-82874 |
Starting with OpenEdge 12.2.19, update releases are provided as complete installations. You no longer need to install a previous version of 12.2 JMS Adapter before applying the update. In other words, you can directly add the OpenEdge JMS Adapter version 12.2.19 or later to an existing OpenEdge installation, even if the JMS Adapter was not previously installed. |
| Install | OCTA-82873 |
Starting with OpenEdge 12.2.19, update releases are provided as full installations. You no longer need to install a previous version of 12.2 ESB Adapter before applying the update. In other words, you can directly add the OpenEdge ESB Adapter version 12.2.19 or later to an existing OpenEdge installation, even if the ESB Adapter was not previously installed. |
| OEM | OCTA-88981 |
When starting a database from OpenEdge Management, the lgTruncateFrequency parameter (which controls database log file truncation frequency) is incorrectly set to 0 (daily) instead of the expected default value –1 (disabled). As a result, log file truncation runs on a daily schedule even though it should be disabled. Workaround: Change the lgTruncateFrequency parameter in OpenEdge Management to any value between 0 and 7, save the change, and then reset the value to –1 and save again. The parameter then retains the correct value of –1. |
| PASOE | OCTA-87658 |
This release upgrades the bundled Apache Tomcat to version 9.0.113. To retain previous behavior, you may set |
| SQL | OCTA-88932 |
In OpenEdge Release 12.2.19, the Progress OpenEdge ODBC Driver has been upgraded to version |
| WebClient | OCTA-89219 |
Running older 12.2 webclient installers on non administrator accounts will fail if the 2017-2026 visual c++ redistributable is installed. |