Cybersecurity Threat Advisory: Critical Oracle EBS flaw

Cybersecurity Threat Advisory

Cybersecurity Threat AdvisoryOracle released an emergency update for its E-Business Suite to address the critical vulnerability CVE-2025-61882 ( with a CVSS of 9.8) because it was actively being exploited by threat actors, particularly the Cl0p ransomware group, in a recent wave of high-volume data theft attacks. The exploitation of this flaw allows attackers to use remote code execution (RCE) to steal large amounts of data from victim organizations. Review the details within this Cybersecurity Threat Advisory to stay protected.

What is the threat?

The vulnerability resides in the Oracle Concurrent Processing component of EBS, specifically within a BI Publisher Integration subcomponent. Concurrent Processing handles background tasks such as report generation and data updates. The flaw allows attackers to exploit the system via unauthenticated HTTP network access, gaining complete control over affected systems without needing login credentials.

Why is it noteworthy?

This vulnerability is particularly dangerous due to its unauthenticated nature and internet-exposed attack vector. Oracle has confirmed that it is being used in real-world extortion and data theft attacks, especially by the Cl0p group. The flaw enables shell-level access, making it easy for attackers to infiltrate and manipulate systems. Its CVSS score of 9.8 highlights the severity and urgency of patching.

What is the exposure or risk?

The exploitation of this vulnerability carries catastrophic risks for organizations running unpatched Oracle EBS instances. Attackers can gain full control over the EBS application server, allowing them to install malware, create new user accounts, and move laterally to other parts of the corporate network. They can steal vast amounts of sensitive corporate data, including financial records, intellectual property, and personally identifiable information (PII) of employees and customers. They demand a ransom, threatening to publicly release the stolen data if the payment is not made. Taking critical ERP systems like EBS offline through encryption can halt business operations, leading to massive financial and reputational damage.

What are the recommendations?

Barracuda recommends the following actions to limit the impact of Oracle EBS exploit:

  • Download and install the patch for CVE-2025-61882 from Oracle’s support website. Oracle’s advisory also notes that one must have applied the October 2023 Critical Patch Update as a prerequisite before applying the emergency patch.
  • Reset all passwords and keys associated with the EBS environment, including database and operating system accounts.
  • Monitor for anomalous HTTP traffic from the given IOC IPs (200.107.207.26, 185.181.60.11) or other suspicious external sources.
  • Restrict external network access to EBS HTTP endpoints (especially those tied to Concurrent Processing/BI Publisher) via firewall, WAF, or network ACLs.

References

For more in-depth information about the recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, don’t hesitate to get in touch with Barracuda Managed XDR’s Security Operations Center.

This post originally appeared on Smarter MSP.