Oracle has launched an emergency replace to deal with a important safety flaw in its E-Enterprise Suite that it stated has been exploited within the current wave of Cl0p knowledge theft assaults.
The vulnerability, tracked as CVE-2025-61882 (CVSS rating: 9.8), issues an unspecified bug that would permit an unauthenticated attacker with community entry by way of HTTP to compromise and take management of the Oracle Concurrent Processing part.
“This vulnerability is remotely exploitable with out authentication, i.e., it might be exploited over a community with out the necessity for a username and password,” Oracle stated in an advisory. “If efficiently exploited, this vulnerability could lead to distant code execution.”
In a separate alert, Oracle’s Chief Safety Officer Rob Duhart stated the corporate has launched fixes for CVE-2025-61882 to “present updates towards further potential exploitation that had been found throughout our investigation.”

As indicators of compromise (IoCs), the know-how shared the next IP addresses and artifacts, indicating the seemingly involvement of the Scattered LAPSUS$ Hunters group as nicely within the exploit –
Information of the Oracle zero-day comes days after experiences emerged of a brand new marketing campaign seemingly undertaken by the Cl0p ransomware group concentrating on Oracle E-Enterprise Suite. Google-owned Mandiant described the continued exercise as a “high-volume e mail marketing campaign” launched from a whole lot of compromised accounts.
In a submit shared on LinkedIn, Charles Carmakal, CTO of Mandiant at Google Cloud, stated “Cl0p exploited a number of vulnerabilities in Oracle EBS which enabled them to steal giant quantities of information from a number of victims in August 2025,” including “a number of vulnerabilities had been exploited together with vulnerabilities that had been patched in Oracle’s July 2025 replace in addition to one which was patched this weekend (CVE-2025-61882).”
“Given the broad mass zero-day exploitation that has already occurred (and the n-day exploitation that may seemingly proceed by different actors), no matter when the patch is utilized, organizations ought to look at whether or not they had been already compromised,” Carmakal famous.
(This can be a creating story. Please test again for extra particulars.)
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s tendencies at present: learn extra, subscribe to our e-newsletter, and turn into a part of the NextTech neighborhood at NextTech-news.com