Particle.news

Download on the App Store

Oracle Issues Emergency Fix for E‑Business Suite Zero‑Day Exploited by Cl0p

Public exploit leaks alongside federal warnings signal a high likelihood of widespread follow-on attacks.

Overview

  • Oracle released an out‑of‑band patch for CVE-2025-61882, an unauthenticated remote‑code‑execution flaw in E‑Business Suite’s Concurrent Processing (BI Publisher Integration) affecting versions 12.2.3–12.2.14, with the October 2023 CPU required first.
  • CISA added the bug to its Known Exploited Vulnerabilities catalog as the FBI labeled risk to EBS environments an emergency, and the UK NCSC urged immediate patching and compromise hunting.
  • Oracle published indicators of compromise, including two source IPs, a reverse‑shell command, and hashes for a leaked exploit archive and Python scripts.
  • Mandiant and CrowdStrike tie the campaign to Cl0p, noting data theft in August 2025, first known exploitation on August 9, and extortion emails that began reaching executives in late September.
  • WatchTowr and CrowdStrike detail a pre‑auth attack chain using SSRF and CRLF injection to load a malicious XSLT template that enables RCE and in‑memory web shells, with a Telegram‑posted exploit raising the risk of rapid n‑day abuse.