Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted

Automattic CEO calls Tumblr his ‘biggest failure’ to date

Regulators investigate Waymo after robot taxi drove around stopped school bus

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted
Identity

Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted

userBy userOctober 20, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 20, 2025Ravi LakshmananThreat intelligence/data security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) catalog, formally confirming that a recently disclosed vulnerability affecting Oracle E-Business Suite (EBS) has been weaponized in a real-world attack.

The security flaw in question is CVE-2025-61884 (CVSS score: 7.5), which describes a server-side request forgery (SSRF) vulnerability in the Oracle Configurator runtime component that could allow an attacker to gain unauthorized access to sensitive data.

“This vulnerability can be exploited remotely without authentication,” CISA said.

DFIR retainer service

CVE-2025-61884 is the second flaw in Oracle EBS to be actively exploited, along with CVE-2025-61882 (CVSS score: 9.8), and is a critical bug that could allow an unauthenticated attacker to execute arbitrary code on a vulnerable instance.

Earlier this month, Google Threat Intelligence Group (GTIG) and Mandiant revealed that dozens of organizations may have been affected by exploits of CVE-2025-61882.

“While we are unable to determine at this time whether a specific exploit activity is the work of a specific attacker, it is likely that at least some of the exploit activity we observed was carried out by an actor currently conducting Cl0p-branded extortion operations,” Xander Wark, senior security engineer at GTIG, told Hacker News last week.

Four other vulnerabilities were added to the KEV catalog by CISA.

CVE-2025-33073 (CVSS Score: 8.8) – Microsoft Windows SMB Client Improper Access Control Vulnerability Allowing Privilege Escalation (fixed by Microsoft in June 2025) CVE-2025-2746 (CVSS Score: 9.8) – Kentico Xperience CMS Authentication bypass using an alternate path or channel vulnerability could allow an attacker to gain control. Managed Objects Using Staging Sync Server Password Handling for Empty SHA1 Usernames in Digest Authentication (Fixed by Kentico in March 2025) CVE-2025-2747 (CVSS Score: 9.8) – Authentication bypass using an alternate path or channel vulnerability in Kentico Xperience CMS could allow an attacker to take control of managed objects by leveraging Staging Sync Server password handling. Server-undefined types (fixed by Kentico in March 2025) CVE-2022-48503 (CVSS score: 8.8) – Improper validation of array index vulnerability in Apple’s JavaScriptCore component that could lead to arbitrary code execution when processing web content (fixed by Apple in July 2022)

CIS build kit

Although details about how the four aforementioned issues are being exploited in the wild are currently unknown, details regarding CVE-2025-33073, CVE-2025-2746, and CVE-2025-2747 have been shared by researchers at Synacktiv and watchTowr Labs, respectively.

Federal Civilian Executive Branch (FCEB) agencies must fix identified vulnerabilities by November 10, 2025 to protect their networks from active threats.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAutomattic CEO calls Tumblr his ‘biggest failure’ to date
user
  • Website

Related Posts

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

October 20, 2025

3 reasons copy/paste attacks cause security breaches

October 20, 2025

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

October 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted

Automattic CEO calls Tumblr his ‘biggest failure’ to date

Regulators investigate Waymo after robot taxi drove around stopped school bus

X launches marketplace for purchasing inactive handles

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.