Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Oracle Issues Urgent E Business Suite Fix

October 14, 2025
Reading Time: 3 mins read
in Alerts
Oracle Issues Urgent E Business Suite Fix

Oracle has issued an urgent security update to address a new vulnerability, CVE-2025-61884, in its E-Business Suite (EBS). The flaw, which affects versions 12.2.3 through 12.2.14 of the EBS Runtime UI component, has a CVSS Base Score of 7.5. The vulnerability is remotely exploitable without authentication, meaning attackers could gain access to sensitive resources over a network without needing a username or password. This prompted Oracle to release an immediate patch and strongly recommend that all customers apply the update as soon as possible. It is not currently known whether this vulnerability has been exploited in the wild.

This new alert follows a separate, recently patched vulnerability in Oracle EBS, CVE-2025-61882. That flaw, which had a critical CVSS score of 9.8, was exploited by a group suspected to be Cl0p ransomware affiliates in a large-scale extortion campaign. In early October, researchers from Google Mandiant and Google Threat Intelligence Group (GTIG) began tracking this activity, where threat actors were attempting to extort company executives with claims that they had stolen Oracle EBS data.

According to cybersecurity firm Halycon, the attackers likely gained access by hacking user emails and then exploiting Oracle E-Business Suite’s default password reset function to steal valid credentials. While an email in the extortion notes was tied to a Cl0p affiliate, Google was unable to confirm the attackers’ claims. However, Mandiant’s CTO Charles Carmakal stated that attackers were using hundreds of hacked accounts in a mass extortion campaign, with at least one account linked to the financially motivated hacker group FIN11.

Researchers at CrowdStrike also attributed the exploitation of the CVE-2025-61882 vulnerability to the Cl0p group, also known as Graceful Spider. The flaw, which affects Oracle E-Business Suite 12.2.3 through 12.2.14, allows unauthenticated remote attackers to take control of the Oracle Concurrent Processing component. CrowdStrike warned that the public disclosure of a proof-of-concept (POC) on October 3 and Oracle’s subsequent patch would likely motivate other threat actors to develop their own weaponized exploits and target exposed EBS instances.

Google’s analysis showed that attackers used a malicious template within vulnerable Oracle EBS databases to store a payload that would be activated in the final stage of the attack chain. While the Cl0p group began emailing organizations about the data theft on September 29, researchers found that exploitation of CVE-2025-61882 had already been happening since August 9, with signs of even earlier activity on July 10, just before Oracle’s July security patches. This suggests that the attackers may have been attempting to exploit the flaw for some time.

Reference:

  • Oracle Releases Emergency Security Update For New E Business Suite Flaw CVE 2025 61884
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

HTTPTroy Backdoor Poses As VPN Invoice

HTTPTroy Backdoor Poses As VPN Invoice

November 3, 2025
HTTPTroy Backdoor Poses As VPN Invoice

China Linked Hackers Exploit Shortcut In

November 3, 2025
HTTPTroy Backdoor Poses As VPN Invoice

BankBot YNRK And DeliveryRAT Exposed

November 3, 2025
Merkle Hit By Major Cyberattack

Active Exploits Hit Dassault And XWiki

October 31, 2025
Merkle Hit By Major Cyberattack

CISA And NSA Warn To Secure Microsoft

October 31, 2025
Merkle Hit By Major Cyberattack

NFC Relay Malware Surge In Europe

October 31, 2025

Latest Alerts

HTTPTroy Backdoor Poses As VPN Invoice

China Linked Hackers Exploit Shortcut In

BankBot YNRK And DeliveryRAT Exposed

NFC Relay Malware Surge In Europe

Active Exploits Hit Dassault And XWiki

CISA And NSA Warn To Secure Microsoft

Subscribe to our newsletter

    Latest Incidents

    Penn Hacker Claims Major Data Breach

    FBI Says Rogue Workers Behind Hacks

    Hackers Extort 350K From Massage Clients

    Ribbon Breached By State Hackers

    EY Data Leak On Microsoft Azure

    Merkle Hit By Major Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial