Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns Of Oracle E-Business Suite SSRF Vulnerability Actively Exploited In Attacks

CISA Warns Of Oracle E-Business Suite SSRF Vulnerability Actively Exploited In Attacks

Posted on October 21, 2025October 21, 2025 By CWS

CISA has issued an pressing alert a few important server-side request forgery (SSRF) vulnerability in Oracle E-Enterprise Suite, now actively exploited by menace actors.

Tracked as CVE-2025-61884, the flaw impacts the Runtime part of Oracle Configurator and permits distant attackers to forge requests with out authentication, doubtlessly resulting in unauthorized entry and knowledge exfiltration.

This vulnerability, rated with a excessive severity rating underneath CVSS 3.1, stems from insufficient enter validation that permits attackers to govern server requests to inner or exterior sources.

As organizations rely closely on Oracle E-Enterprise Suite for enterprise useful resource planning (ERP), the dangers are amplified in sectors like finance, manufacturing, and authorities, the place delicate knowledge flows via these techniques.

Exploitation Ways And Actual-World Impression

CISA’s Identified Exploited Vulnerabilities (KEV) catalog added CVE-2025-61884 after proof emerged of energetic exploitation within the wild.

Attackers can leverage SSRF to scan inner networks, bypass firewalls, and work together with cloud metadata companies, usually as a stepping stone for broader intrusions.

Whereas direct ties to ransomware campaigns stay unconfirmed, safety researchers notice similarities to ways utilized in latest provide chain assaults, the place SSRF flaws have facilitated lateral motion.

Oracle patched the problem in its October 2025 Crucial Patch Replace, however unpatched techniques stay prime targets.

Early experiences point out exploitation makes an attempt concentrating on outdated E-Enterprise Suite installations within the Asia-Pacific areas, with potential for widespread compromise if organizations delay remediation.

The flaw aligns with CWE-918, a typical SSRF weak spot that has plagued enterprise software program for years.

Mitigations

CISA urges rapid motion: apply Oracle’s vendor-provided patches or mitigations, equivalent to community segmentation and internet software firewalls (WAFs) tuned to dam anomalous requests.

For cloud-hosted cases, adhere to Binding Operational Directive (BOD) 22-01, which mandates vulnerability administration in federal techniques.

If mitigations show infeasible, CISA advises discontinuing use of affected merchandise to keep away from publicity. Specialists emphasize proactive monitoring, together with logging SSRF indicators like surprising outbound visitors.

Organizations ought to scan their networks for vulnerabilities utilizing instruments like Nessus or OpenVAS and assessment entry logs for indicators of exploitation.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Attacks, CISA, EBusiness, Exploited, Oracle, SSRF, Suite, Vulnerability, Warns

Post navigation

Previous Post: CISA Warns of Exploited Apple, Kentico, Microsoft Vulnerabilities
Next Post: Veeam to Acquire Data Security Firm Securiti AI for $1.7 Billion

Related Posts

Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot Threat Actors Attacking Windows Systems With New Multi-Stage Malware Framework PS1Bot Cyber Security News
CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware Cyber Security News
Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities Cyber Security News
15 Best Website Monitoring Tools in 2025 15 Best Website Monitoring Tools in 2025 Cyber Security News
1inch Named Exclusive Swap Provider at Launch for Ledger Multisig 1inch Named Exclusive Swap Provider at Launch for Ledger Multisig Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News