Oracle has disclosed a critical vulnerability (CVE-2025-61882) (Patch Notes)

 


Oracle has disclosed a critical vulnerability (CVE-2025-61882) affecting E-Business Suite versions 12.2.3 through 12.2.14. This pre-authentication remote code execution (RCE) flaw enables unauthenticated attackers to exploit multiple chained weaknesses — including SSRF, CRLF injection, authentication bypass, and unsafe XSLT processing — to gain full control of affected systems.

Risk Assessment:

  • Severity: Critical (CVSS 9.8)
  • Exposure: Internet-facing Oracle EBS instances are at immediate risk
  • Threat Activity: Active exploitation confirmed by threat intelligence sources, including Cl0p ransomware group
  • Business Impact: Potential compromise of financial systems, data exfiltration, and operational disruption

Recommended Actions:

  1. Immediate Patch Deployment:
    Apply Oracle’s July 2025 Critical Patch Update to all affected EBS environments.
  2. Network Segmentation:
    Restrict public access to Oracle EBS systems. Ensure they are isolated from internet-facing zones.
  3. Threat Monitoring:
    Enable enhanced logging and monitor for indicators of compromise (IOCs) related to CVE-2025-61882.
Vulnerability Validation:
Use tools such as Picus Security’s validation guide or open-source scanners to confirm remediation.

For more information check for updates here. https://www.oracle.com/security-alerts/alert-cve-2025-61882.html

Popular posts from this blog

Microsoft Defender for Endpoint (DFE) and Mitigation for It

Active Directory Synchronization Bug and Fix