Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA warns that critical zero-day vulnerability in Oracle Identity Manager is being actively exploited
Identity

CISA warns that critical zero-day vulnerability in Oracle Identity Manager is being actively exploited

userBy userNovember 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 22, 2025Rabi LakshmananZero-day/Software Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), which could result in missing authentication for a critical function, potentially leading to pre-authenticated remote code execution. This vulnerability affects versions 12.2.1.4.0 and 14.1.2.1.0. This issue was addressed by Oracle as part of a quarterly update released last month.

DFIR retainer service

“Oracle Fusion Middleware lacks authentication for vulnerabilities in critical functionality that could allow an unauthenticated, remote attacker to take over Identity Manager,” CISA said.

Searchlight Cyber ​​researchers Adam Cuse and Shubham Shah, who discovered the flaw, said the vulnerability could allow attackers to gain access to API endpoints, allowing them to “manipulate authentication flows, escalate privileges, and move laterally across an organization’s core systems.”

Specifically, this is due to a security filter bypass that tricks protected endpoints into treating them as publicly accessible by simply appending “?WSDL” or “;.wadl” to any URI. This is the result of a flaw in the allow list mechanism, which is based on regular expressions or string matching against the request URI.

“This system is highly error-prone, and there are usually ways to trick these filters into believing you are accessing an unauthenticated route,” the researchers noted.

Authentication bypass can then be combined with a request to the “/iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus” endpoint to achieve remote code execution by sending a specially crafted HTTP POST. Although this endpoint is only intended to check the syntax of Groovy code and not execute it, Searchlight Cyber ​​says that it “allows you to create Groovy annotations that are executed at compile time, even if the compiled code is not actually executed.”

CVE-2025-61757 was added to the KEV Catalog by Johannes B. Ullrich, Director of Research at SANS Technology Institute, based on analysis of honeypot logs that revealed that an exploit was detected via an HTTP POST request between August 30th and September 9th. This comes days after the company announced that several attempts were made to access the URL /iam/governance/applicationmanagement/api/v1/applications/groovyscriptstatus;.wadl. 2025.

“Several different IP addresses are doing the scanning, but they’re all using the same user agent, which suggests we may be dealing with a single attacker,” Ulrich said. “Unfortunately, the bodies of these requests were not captured, but they were all POST requests. The content length header indicated a 556-byte payload.”

CIS build kit

This indicates that this vulnerability could have been exploited as a zero-day vulnerability long before Oracle shipped a patch. The IP address from which the attempt originates is:

89.238.132[.]76 185.245.82[.]81 138.199.29[.]153

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies must apply the necessary patches by December 12, 2025 to protect their networks.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow this founder’s serendipitous path to Silicon Valley led to an industrial technology advantage
Next Article Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
user
  • Website

Related Posts

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Prince Andrew’s advisor encouraged Jeffrey Epstein to invest in EV startups like Lucid Motors

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.