NCSC Alerts to Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

The National Cyber Security Centre (NCSC) has issued a critical advisory regarding a zero-day vulnerability in Oracle’s E-Business Suite (EBS), which is actively being exploited.

Designated as CVE-2025-61882, the flaw is embedded within the BI Publisher Integration component of Oracle’s Concurrent Processing. This vulnerability permits unauthenticated remote code execution.

Entities operating EBS versions 12.2.3 through 12.2.14, particularly those with internet exposure, face the most significant risk.

Oracle BI Publisher Vulnerability (CVE-2025-61882)

Oracle’s security notice confirms that attackers can dispatch meticulously crafted HTTP requests to the BI Publisher Integration servlet without prior authentication, potentially leading to full system compromise.

No user interaction is necessary for this exploit. A proof-of-concept HTTP request pattern is illustrated below:

The successful exploitation of this flaw could enable arbitrary command execution under the Oracle EBS application account, which may result in data exfiltration, complete system takeover, or lateral movements within the corporate network.

Indicators of compromise (IoCs) noted in Oracle’s advisory encapsulate anomalous servlet URIs, unexpected child processes spawned by $XBPSRV, and suspicious outbound connections on non-standard ports.

The NCSC is diligently monitoring reports of incidents and has discerned numerous exploitation attempts against organizations in the UK.

Exposed EBS instances on the public internet are primarily targeted, although poorly segmented internal networks are also susceptible to threat actors who may obtain an initial foothold.

Risk FactorsDetails
Affected ProductsOracle E-Business Suite (EBS) versions 12.2.3 – 12.2.14; BI Publisher Integration component of Oracle Concurrent Processing
ImpactRemote code execution (RCE)
Exploit PrerequisitesNetwork access to the exposed BI Publisher Integration endpoint; no authentication or user interaction required
CVSS 3.1 Score9.8 (Critical)

Mitigation

In response to CVE-2025-61882, the NCSC advises UK organizations to implement a multi-layered defense strategy.

It is imperative to apply Oracle’s October 2023 Critical Patch Update, followed by the specific EBS patch addressing CVE-2025-61882. Detailed installation guidelines are provided in Oracle’s advisory.

Malicious Actors Exploit Oracle Database Scheduler to infiltrate Corporate Networks

Utilize the provided IoCs to scrutinize logs, web access records, and process listings for indications of exploitation. Tools such as grep and SIEM rules can assist in identifying:

Minimize public exposure of Oracle EBS components. When internet access is essential, it is critical to establish web application firewalls (WAFs), implement stringent access control lists (ACLs), and adhere to network perimeter guidelines as specified by the NCSC.

Deploy Endpoint Detection and Response (EDR) agents on application servers and conduct behavioral analyses to detect unusual child processes or unusual outbound traffic.

If a compromise is suspected, promptly contact Oracle PSIRT and report to the NCSC through its online portal. Timely notification can facilitate coordinated responses and threat intelligence exchange.

Additional complimentary NCSC resources encompass guidance on vulnerability management, strategies to prevent lateral movement, and the Early Warning service, which provides real-time alerts.

Taking these precautions will bolster the resilience of Oracle E-Business Suite against current and future vulnerabilities.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading