Skip to main content

Oracle Releases Security Advisory for E-Business Suite

Oracle has reported exploitation of CVE-2025-61882 in the wild as a zero-day vulnerability which, if successfully exploited, could allow unauthenticated remote code execution on affected E-Business Suite appliances

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Oracle has reported exploitation of CVE-2025-61882 in the wild as a zero-day vulnerability which, if successfully exploited, could allow unauthenticated remote code execution on affected E-Business Suite appliances


Threat details

Exploitation of CVE-2025-61882

Oracle has reported exploitation of CVE-2025-61882 in the wild as a zero-day vulnerability. The NHS England National CSOC is aware of a public proof-of-concept exploit and assesses further exploitation as highly likely.


Introduction

Oracle has released a security update to address a critical severity vulnerability in the Oracle Concurrent Processing product of the Oracle E-Business Suite BI Publisher integration.


Vulnerability details

  • CVE-2025-61882 has a CVSSv3 score of 9.8. Successful exploitation could allow a remote unauthenticated attacker to execute arbitrary code and take control of Oracle Concurrent Processing. This vulnerability is under active exploitation.

Remediation advice

Affected organisations must review Oracle's Security Alert Advisory - CVE-2025-61882 and follow the remediation steps below.


Remediation steps

Type Step
Patch

Required: Organisations must apply the latest Oracle E-Business Suite update as soon as possible.

The October 2023 Critical Patch Update must be installed first before the security update addressing CVE-2025-61882 is installed.

Note: Organisations running "sustaining support" or end-of-life releases of Oracle E-Business Suite must upgrade to a supported version.


https://www.oracle.com/security-alerts/alert-cve-2025-61882.html
Action

Optional: Where possible, organisations are strongly encouraged to hunt for the indicators of compromise detailed in Oracle's advisory. 

Additional indicators of compromise are available in NHS England's Threat Intelligence Sharing Platform (TISP). For more information on the TISP, please speak to your Regional Security Lead. 

If evidence of compromise is detected, organisations must immediately report this to the NHS England National Cyber Security Operations Centre (CSOC) by calling 0300 303 5222 or emailing [email protected].


https://www.oracle.com/security-alerts/alert-cve-2025-61882.html


Last edited: 6 October 2025 12:01 pm