Oracle Issues Security Notice for Critical Vulnerability in E-Business Suite

Oracle has announced a security alert regarding a serious vulnerability (CVE-2025-61882) affecting certain versions of its E-Business Suite. The flaw allows attackers to remotely execute malicious code on targeted systems without needing any authentication, representing a significant security risk.

The vulnerability exists within the BI Publisher component of the Oracle E-Business Suite, affecting versions 12.2.3 through 12.2.14. It can be exploited over the network via standard HTTP requests, meaning attackers do not require valid user credentials to leverage this flaw. The severity score assigned by Oracle’s CVSS system is 9.8 out of 10, indicating a critical threat level.

If exploited successfully, this flaw could enable an attacker to run arbitrary code on the affected server, potentially leading to full control over the system. Oracle emphasizes that the vulnerability is remotely exploitable, making timely patching essential.

Recommended Actions

Oracle strongly urges affected customers to apply the security updates immediately. These patches depend on systems being up-to-date with the October 2023 Critical Patch Update (CPU), which must be installed beforehand.

Organizations should verify they are running supported versions and apply all relevant security updates as part of routine maintenance. Systems running unsupported versions are likely vulnerable, and upgrading to a supported release is advised.

This vulnerability impacts Oracle E-Business Suite, versions 12.2.3 to 12.2.14.

The flaw is tied to the BI Publisher integration component, with no authentication needed for malicious actors to exploit over HTTP.

Organizations should review the resources promptly to understand the scope of the vulnerability and mitigate associated risks. Given the high severity and ease of remote exploitation, immediate action is critical.

Applying patches and monitoring for suspicious activity are essential steps to protect enterprise infrastructure.

For more details including patch information and indicators of compromise for detection, visit the official Oracle security advisory here.


Comments Section

Leave a Reply

Your email address will not be published. Required fields are marked *



,
Back to Top - Modernizing Tech