Article Details
Scrape Timestamp (UTC): 2025-10-06 05:17:45.729
Source: https://thehackernews.com/2025/10/oracle-rushes-patch-for-cve-2025-61882.html
Original Article Text
Click to Toggle View
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks. Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the recent wave of Cl0p data theft attacks. The vulnerability, tracked as CVE-2025-61882 (CVSS score: 9.8), concerns an unspecified bug that could allow an unauthenticated attacker with network access via HTTP to compromise and take control of the Oracle Concurrent Processing component. "This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password," Oracle said in an advisory. "If successfully exploited, this vulnerability may result in remote code execution." In a separate alert, Oracle's Chief Security Officer Rob Duhart said the company has released fixes for CVE-2025-61882 to "provide updates against additional potential exploitation that were discovered during our investigation." As indicators of compromise (IoCs), the technology shared the following IP addresses and artifacts, indicating the likely involvement of the Scattered LAPSUS$ Hunters group as well in the exploit - News of the Oracle zero-day comes days after reports emerged of a new campaign likely undertaken by the Cl0p ransomware group targeting Oracle E-Business Suite. Google-owned Mandiant described the ongoing activity as a "high-volume email campaign" launched from hundreds of compromised accounts. In a post shared on LinkedIn, Charles Carmakal, CTO of Mandiant at Google Cloud, said "Cl0p exploited multiple vulnerabilities in Oracle EBS which enabled them to steal large amounts of data from several victims in August 2025," adding "multiple vulnerabilities were exploited including vulnerabilities that were patched in Oracle's July 2025 update as well as one that was patched this weekend (CVE-2025-61882)." "Given the broad mass zero-day exploitation that has already occurred (and the n-day exploitation that will likely continue by other actors), irrespective of when the patch is applied, organizations should examine whether they were already compromised," Carmakal noted. (This is a developing story. Please check back for more details.)
Daily Brief Summary
Oracle issued an emergency patch for CVE-2025-61882, a critical vulnerability in its E-Business Suite, exploited by Cl0p in recent data theft operations.
The flaw, with a CVSS score of 9.8, allows unauthenticated remote attackers to execute code via HTTP, posing significant security risks.
Oracle's Chief Security Officer confirmed additional fixes were released following further investigations into potential exploitations.
Indicators of compromise suggest involvement of the Scattered LAPSUS$ Hunters group in exploiting this vulnerability.
Mandiant reported Cl0p's use of multiple vulnerabilities, including those patched in Oracle's July 2025 update, to execute high-volume email campaigns.
Organizations are urged to apply patches promptly and assess if any prior breaches occurred due to the zero-day exploit.
The situation remains dynamic, with ongoing updates expected as new information emerges.