Oracle has issued an emergency safety alert for a vital zero-day vulnerability (CVE-2025-61882) in its E-Enterprise Suite after the infamous Cl0p ransomware group started extorting clients who didn’t patch their techniques.
The vulnerability, carrying a most CVSS rating of 9.8, impacts the Enterprise Intelligence Writer (BI Writer) Integration part and permits distant code execution with out authentication.
The vulnerability CVE-2025-61882 represents a major menace to Oracle E-Enterprise Suite deployments worldwide. Safety researchers have confirmed that public proof-of-concept exploits at the moment are out there, dramatically growing the danger for unpatched techniques.
The flaw impacts Oracle EBS variations 12.2.3 via 12.2.14, requiring organizations to implement Oracle’s October 2023 CPU as a prerequisite earlier than making use of the newest safety patches.
Tenable investigation revealed that Cl0p ransomware operators have been systematically concentrating on Oracle E-Enterprise Suite installations, leveraging this zero-day vulnerability to realize unauthorized entry to enterprise techniques.
Cl0p Exploiting Unpatched Oracle EBS Vulnerability
The assault marketing campaign got here to mild when a number of Oracle clients acquired extortion emails from the Cl0p group, claiming to have efficiently infiltrated their EBS environments and stolen delicate enterprise information.
Tenable acknowledged that the Oracle Concurrent Processing part vulnerability permits attackers to execute arbitrary code remotely with out requiring authentication credentials, making it a beautiful goal for cybercriminals.
Safety specialists emphasize that the mixture of widespread Oracle EBS deployment in enterprise environments and the vulnerability’s excessive severity rating creates an ideal storm for large-scale assaults.
The Cl0p ransomware group, also referred to as TA505 and FIN11, has established a sample of concentrating on zero-day vulnerabilities in enterprise file switch and enterprise software software program.
Earlier campaigns efficiently exploited vulnerabilities in Accellion, MOVEit Switch, GoAnywhere, and Cleo platforms, demonstrating the group’s refined functionality to establish and weaponize high-impact safety flaws.
Threat FactorsDetailsAffected ProductsOracle E-Enterprise Suite, Enterprise Intelligence Writer (BI Writer) Integration 12.2.3 via 12.2.14ImpactRemote Code ExecutionExploit PrerequisitesNetwork entry to Oracle EBS occasion, No authentication requiredCVSS 3.1 Score9.8 (Crucial)
Mitigations
Oracle’s safety advisory consists of a number of indicators of compromise (IOCs) to assist organizations detect potential intrusions.
The corporate has launched patches addressing not solely CVE-2025-61882 but in addition 9 further vulnerabilities from the July 2025 Crucial Patch Replace that will have been exploited along side the zero-day flaw.
Safety groups should prioritize quick patching of affected Oracle EBS techniques, significantly given the supply of public exploits.
Organizations also needs to implement community monitoring for suspicious exercise concentrating on the BI Writer Integration part and evaluate entry logs for unauthorized administrative actions.
The incident underscores the vital significance of sustaining present patch ranges and implementing defense-in-depth methods to guard in opposition to zero-day exploitation campaigns.
Cyber Consciousness Month Provide: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be a part of As we speak