Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Published: 2025-10-06
Oracle patches EBS zero-days CVE-2025-61882, exploited by Cl0p, and related flaw CVE-2025-61884. Get the latest details on these critical security updates.
https://thehackernews.com/2025/10/five-new-exploited-bugs-land-in-cisas.html
https://www.securityweek.com/oracle-patches-ebs-vulnerability-allowing-access-to-sensitive-data/
https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html
https://www.securityweek.com/sophisticated-malware-deployed-in-oracle-ebs-zero-day-attacks/
https://www.infosecurity-magazine.com/news/google-clop-data-oracle-exploit/
https://thehackernews.com/2025/10/cl0p-linked-hackers-breach-dozens-of.html
https://www.databreachtoday.com/clop-attacks-against-oracle-e-business-suite-trace-to-july-a-29692
https://cyberscoop.com/oracle-customers-attacks-clop-google-mandiant/
https://www.hipaajournal.com/cl0p-mass-exploiting-zero-day-vulnerability-oracle-e-business-suite/
https://www.infosecurity-magazine.com/news/ncsc-patch-critical-oracle-ebs-bug/
https://www.helpnetsecurity.com/2025/10/07/leaked-oracle-ebs-exploit-attacks-cve-2025-61882/
https://www.databreachtoday.com/oracle-zero-day-more-being-exploited-by-ransomware-group-a-29663
https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/
https://www.theregister.com/2025/10/06/clop_oracle_ebs_zeroday/
https://www.securityweek.com/oracle-e-business-suite-zero-day-exploited-in-cl0p-attacks/
https://www.helpnetsecurity.com/2025/10/06/cl0p-oracle-data-theft-extortion-cve-2025-61882/
https://www.darkreading.com/application-security/clop-ransomware-oracle-customers-zero-day-flaw
https://therecord.media/fbi-uk-urge-orgs-to-patch-after-clop-campaign
https://thehackernews.com/2025/10/oracle-rushes-patch-for-cve-2025-61882.html
Published: 2025-10-05
Updated: 2025-10-21
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.85535
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest