Oracle Releases Security Advisory for E-Business Suite
Oracle has reported exploitation of CVE-2025-61882 in the wild as a zero-day vulnerability which, if successfully exploited, could allow unauthenticated remote code execution on affected E-Business Suite appliances
Summary
Oracle has reported exploitation of CVE-2025-61882 in the wild as a zero-day vulnerability which, if successfully exploited, could allow unauthenticated remote code execution on affected E-Business Suite appliances
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2025-61882
Oracle has reported exploitation of CVE-2025-61882 in the wild as a zero-day vulnerability. The NHS England National CSOC is aware of a public proof-of-concept exploit and assesses further exploitation as highly likely.
Introduction
Oracle has released a security update to address a critical severity vulnerability in the Oracle Concurrent Processing product of the Oracle E-Business Suite BI Publisher integration.
Vulnerability details
- CVE-2025-61882 has a CVSSv3 score of 9.8. Successful exploitation could allow a remote unauthenticated attacker to execute arbitrary code and take control of Oracle Concurrent Processing. This vulnerability is under active exploitation.
Remediation advice
Affected organisations must review Oracle's Security Alert Advisory - CVE-2025-61882 and follow the remediation steps below.
Remediation steps
| Type | Step |
|---|---|
| Patch |
Required: Organisations must apply the latest Oracle E-Business Suite update as soon as possible. The October 2023 Critical Patch Update must be installed first before the security update addressing CVE-2025-61882 is installed. Note: Organisations running "sustaining support" or end-of-life releases of Oracle E-Business Suite must upgrade to a supported version. https://www.oracle.com/security-alerts/alert-cve-2025-61882.html |
| Action |
Optional: Where possible, organisations are strongly encouraged to hunt for the indicators of compromise detailed in Oracle's advisory. Additional indicators of compromise are available in NHS England's Threat Intelligence Sharing Platform (TISP). For more information on the TISP, please speak to your Regional Security Lead. If evidence of compromise is detected, organisations must immediately report this to the NHS England National Cyber Security Operations Centre (CSOC) by calling 0300 303 5222 or emailing [email protected]. https://www.oracle.com/security-alerts/alert-cve-2025-61882.html |
Definitive source of threat updates
Last edited: 6 October 2025 12:01 pm