HomeVulnerability5 New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft...

5 New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Amongst Targets

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Monday added 5 security flaws to its Recognized Exploited Vulnerabilities (KEV) Catalog, formally confirming a lately disclosed vulnerability impacting Oracle E-Enterprise Suite (EBS) has been weaponized in real-world assaults.

The security defect in query is CVE-2025-61884 (CVSS rating: 7.5), which has been described as a server-side request forgery (SSRF) vulnerability within the Runtime element of Oracle Configurator that might enable attackers unauthorized entry to essential knowledge.

“This vulnerability is remotely exploitable with out authentication,” CISA stated.

DFIR Retainer Services

CVE-2025-61884 is the second flaw in Oracle EBS to be actively exploited together with CVE-2025-61882 (CVSS rating: 9.8), a essential bug that might allow unauthenticated attackers to execute arbitrary code on prone cases.

Earlier this month, Google Menace Intelligence Group (GTIG) and Mandiant revealed dozens of organizations could have been impacted following the exploitation of CVE-2025-61882.

“Right now, we aren’t in a position to attribute any particular exploitation exercise to a particular actor, however it’s seemingly that no less than among the exploitation exercise we noticed was performed by actors now conducting Cl0p-branded extortion operations,” Zander Work, senior security engineer at GTIG, advised The Hacker Information final week.

See also  Three Tricks to Defend Your Secrets and techniques from AI Accidents

Additionally added by CISA to the KEV catalog are 4 different vulnerabilities –

  • CVE-2025-33073 (CVSS rating: 8.8) – An improper entry management vulnerability in Microsoft Home windows SMB Shopper that might enable for privilege escalation (Mounted by Microsoft in June 2025)
  • CVE-2025-2746 (CVSS rating: 9.8) – An authentication bypass utilizing an alternate path or channel vulnerability in Kentico Xperience CMS that might enable an attacker to manage administrative objects by benefiting from the Staging Sync Server password dealing with of empty SHA1 usernames in digest authentication (Mounted in Kentico in March 2025)
  • CVE-2025-2747 (CVSS rating: 9.8) – An authentication bypass utilizing an alternate path or channel vulnerability in Kentico Xperience CMS that might enable an attacker to manage administrative objects by benefiting from the Staging Sync Server password dealing with for the server outlined None sort (Mounted in Kentico in March 2025)
  • CVE-2022-48503 (CVSS rating: 8.8) – An improper validation of array index vulnerability in Apple’s JavaScriptCore element that might end in arbitrary code execution when processing net content material (Mounted by Apple in July 2022)
CIS Build Kits

There are presently no particulars on how the aforementioned 4 points are being exploited within the wild, though particulars about CVE-2025-33073, CVE-2025-2746, and CVE-2025-2747 had been shared by researchers from Synacktiv and watchTowr Labs, respectively.

See also  Consumer-Expertise-Irrwege: 5 Fehler, die Ihre Sicherheit gefährden

Federal Civilian Govt Department (FCEB) companies are required to remediate recognized vulnerabilities by November 10, 2025, to safe their networks towards energetic threats.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular