
Oracle has released an emergency update to address critical security flaws in its e-business suite, which it said was exploited in the recent wave of CL0P data theft attacks.
The vulnerability tracked as CVE-2025-61882 (CVSS score: 9.8) concerns an unspecified bug that allows unauthenticated attackers with network access over HTTP to compromise and control Oracle Concurrent Processing components.
“This vulnerability can be exploited remotely without authentication, meaning it could be exploited on a network without requiring a username and password,” Oracle said in its advisory. “If successful, this vulnerability could lead to remote code execution.”
Oracle’s Chief Security Officer Rob Duhart said in another alert that the company has released an amendment to CVE-2025-61882, “providing updates on additional potential exploitations discovered during the investigation.”

As a compromise indicator (IOC), the technology shares the following IP addresses and artifacts, indicating the potential for involvement in the scattered Lapsus $Hunters group exploits –
The news about Oracle Zero-Day comes just days after reports of a new campaign likely launched by the CL0P ransomware group targeting Oracle E-Business Suite. Mandiant, owned by Google, described its ongoing activities as a “massive email campaign” that started with hundreds of compromised accounts.
In a post shared on LinkedIn, Charles Carmakal, CTO of Mandiant at Google Cloud, said, “CL0P was able to steal a large amount of data from multiple victims in August 2025 because it exploited multiple vulnerabilities in Oracle EBS,” and multiple vulnerabilities were exploited, including a patched vulnerability for Oracle weekend. (CVE-2025-61882). ”
“No matter when the patch is applied, given the widespread zero-day exploitation that has already occurred (and the continuing N-Day exploitation of other actors), organizations need to look into whether they have already compromised,” Carmakal said.
(This is a developing story. Please check again for more details.)
Source link