Oracle released an emergency patch for **CVE-2025-61882** (CVSS 9.8), a critical zero-day vulnerability in its **E-Business Suite**, actively exploited by the **Cl0p ransomware group** and potentially the **Scattered LAPSUS$ Hunters**. The flaw allows unauthenticated remote attackers to execute arbitrary code via HTTP, compromising the **Oracle Concurrent Processing** component. Cl0p leveraged this in a **high-volume phishing campaign**, stealing large volumes of sensitive data from multiple victims in **August 2025**. Indicators of compromise (IoCs) include malicious IP addresses (e.g., **200.107.207[.]26**, **185.181.60[.]11**), reverse shell payloads, and exploit scripts (e.g., *oracle_ebs_nday_exploit_poc_...*). Mandiant warned of **mass exploitation**, urging organizations to investigate potential breaches even after patching, as attackers may have already exfiltrated data. The incident highlights the risk of **supply-chain attacks** via unpatched enterprise software, with Cl0p’s campaign targeting financial, HR, and operational data—potentially disrupting business continuity and exposing customers/employees to fraud or regulatory penalties.
Source: https://thehackernews.com/2025/10/oracle-rushes-patch-for-cve-2025-61882.html
TPRM report: https://www.rankiteo.com/company/oracle
"id": "ora5662156100625",
"linkid": "oracle",
"type": "Ransomware",
"date": "5/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'Multiple (exact number '
'undisclosed)',
'industry': 'Enterprise Software',
'location': 'Global (HQ: Redwood City, California, '
'USA)',
'name': 'Oracle Corporation',
'size': 'Large (Multinational)',
'type': 'Technology Vendor'}],
'attack_vector': ['Network-based (HTTP)',
'Unauthenticated Remote Code Execution'],
'customer_advisories': 'Customers advised to patch and investigate potential '
'compromise.',
'data_breach': {'data_exfiltration': True},
'date_detected': '2025-08',
'date_publicly_disclosed': '2025-08',
'description': 'Oracle released an emergency update to patch a critical '
'zero-day vulnerability (CVE-2025-61882, CVSS 9.8) in its '
'E-Business Suite, actively exploited by the Cl0p ransomware '
'group in a high-volume data theft campaign. The flaw allows '
'unauthenticated remote code execution via HTTP in the Oracle '
'Concurrent Processing component. Indicators of compromise '
'(IoCs) suggest involvement of the Scattered LAPSUS$ Hunters '
'group, with evidence of exploit PoCs and malicious IP '
'activity. Mandiant reported the campaign as part of a broader '
'wave of attacks targeting Oracle EBS vulnerabilities, '
'including those patched in July 2025 and the newly disclosed '
'zero-day.',
'impact': {'brand_reputation_impact': 'High (due to zero-day exploitation and '
'association with Cl0p ransomware)',
'data_compromised': 'Large amounts of data (exact scope '
'undisclosed)',
'identity_theft_risk': 'Potential (depends on stolen data types)',
'systems_affected': 'Oracle E-Business Suite (Concurrent '
'Processing Component)'},
'initial_access_broker': {'entry_point': 'Oracle E-Business Suite Concurrent '
'Processing Component (via HTTP)',
'high_value_targets': 'Enterprise data within '
'Oracle EBS environments'},
'investigation_status': 'Ongoing (developing story)',
'lessons_learned': 'Zero-day vulnerabilities in widely used enterprise '
'software like Oracle E-Business Suite can lead to rapid, '
'high-impact exploitation by multiple threat actors. '
'Organizations must prioritize patch management and assume '
'breach scenarios even after patching, given the '
'likelihood of prior compromise during mass exploitation '
'campaigns.',
'motivation': ['Data Theft',
'Financial Gain (Ransomware)',
'Exploitation of Zero-Day for Mass Compromise'],
'post_incident_analysis': {'corrective_actions': ['Emergency patch release by '
'Oracle.',
'Public disclosure and '
'customer advisories.',
'Collaboration with '
'Mandiant for threat '
'intelligence sharing.'],
'root_causes': ['Zero-day vulnerability '
'(CVE-2025-61882) in Oracle '
'E-Business Suite.',
'Lack of authentication '
'requirements for exploitation.',
'High-volume email campaign '
'leveraging compromised accounts '
'(per Mandiant).']},
'ransomware': {'data_exfiltration': True, 'ransomware_strain': 'Cl0p'},
'recommendations': ["Immediately apply Oracle's emergency patch for "
'CVE-2025-61882.',
'Conduct forensic investigations to detect signs of prior '
'exploitation.',
'Monitor for IoCs, including the listed IP addresses '
'(200.107.207[.]26, 185.181.60[.]11) and exploit '
'artifacts.',
'Enhance logging and network segmentation for Oracle EBS '
'environments.',
"Review Mandiant's advisory for additional mitigation "
'strategies.'],
'references': [{'date_accessed': '2025-08',
'source': 'Oracle Security Advisory'},
{'date_accessed': '2025-08',
'source': 'Mandiant (Google Cloud) Alert on Cl0p Campaign'},
{'date_accessed': '2025-08',
'source': 'LinkedIn Post by Charles Carmakal (Mandiant CTO)'}],
'response': {'communication_strategy': ['Public Advisory',
'LinkedIn Post by Oracle CSO',
'Mandiant Technical Alert'],
'containment_measures': ['Emergency Patch Release '
'(CVE-2025-61882)',
'Advisory for Customer Mitigation'],
'enhanced_monitoring': 'Recommended for customers to detect '
'prior compromise',
'incident_response_plan_activated': True,
'remediation_measures': ['Patch Application',
'Investigation into Potential Prior '
'Compromise'],
'third_party_assistance': ['Mandiant (Google Cloud)']},
'stakeholder_advisories': 'Oracle and Mandiant have issued public advisories '
'urging immediate action.',
'threat_actor': ['Cl0p Ransomware Group', 'Scattered LAPSUS$ Hunters'],
'title': 'Critical Zero-Day Exploit in Oracle E-Business Suite '
'(CVE-2025-61882) Linked to Cl0p Ransomware Attacks',
'type': ['Data Breach', 'Zero-Day Exploit', 'Ransomware Attack'],
'vulnerability_exploited': 'CVE-2025-61882 (CVSS 9.8) - Oracle E-Business '
'Suite Concurrent Processing Component'}