CVE-2025-61882

9.8 CRITICAL CISA KEV

📋 TL;DR

This critical vulnerability in Oracle E-Business Suite's Concurrent Processing component allows unauthenticated attackers to remotely execute arbitrary code via HTTP requests. Attackers can completely compromise Oracle Concurrent Processing servers, potentially gaining full control over affected systems. Organizations running Oracle E-Business Suite versions 12.2.3 through 12.2.14 with BI Publisher Integration are affected.

💻 Affected Systems

Products:
  • Oracle E-Business Suite
Versions: 12.2.3 through 12.2.14
Operating Systems: All platforms running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the BI Publisher Integration component within Oracle Concurrent Processing. All deployments with this component enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover leading to data theft, ransomware deployment, lateral movement to other systems, and permanent backdoor installation.

🟠

Likely Case

Remote code execution leading to data exfiltration, credential harvesting, and deployment of additional malware payloads.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and intrusion detection systems are in place to block exploitation attempts.

🌐 Internet-Facing: HIGH - Unauthenticated network access via HTTP makes internet-facing instances extremely vulnerable to mass scanning and exploitation.
🏢 Internal Only: HIGH - Even internal systems are at high risk due to unauthenticated exploitation and potential lateral movement from compromised endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, and CrowdStrike has identified active exploitation campaigns targeting this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply July 2025 Critical Patch Update (CPU)

Vendor Advisory: https://www.oracle.com/security-alerts/alert-cve-2025-61882.html

Restart Required: Yes

Instructions:

1. Download the July 2025 Critical Patch Update from Oracle Support. 2. Apply the patch to all affected Oracle E-Business Suite instances. 3. Restart Oracle Concurrent Processing services. 4. Test the patch in a non-production environment first if possible.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Oracle Concurrent Processing ports (typically 8000, 8001) to only trusted IP addresses

iptables -A INPUT -p tcp --dport 8000 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 8000 -j DROP

Web Application Firewall Rules

all

Implement WAF rules to block suspicious HTTP requests to BI Publisher Integration endpoints

🧯 If You Can't Patch

  • Isolate affected systems from internet and restrict internal network access using firewall rules
  • Implement additional monitoring and alerting for suspicious activities on Oracle Concurrent Processing servers

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and verify if running versions 12.2.3 through 12.2.14 with BI Publisher Integration enabled

Check Version:

SELECT RELEASE_NAME FROM FND_PRODUCT_GROUPS;

Verify Fix Applied:

Verify July 2025 CPU patch is applied and test that unauthorized HTTP requests to BI Publisher endpoints are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /xmlpserver/ or /bi/ endpoints
  • Multiple failed authentication attempts followed by successful access
  • Unusual process creation from Oracle processes

Network Indicators:

  • HTTP requests with unusual parameters to Oracle ports
  • Outbound connections from Oracle servers to unknown external IPs
  • Sudden increase in traffic to Oracle application servers

SIEM Query:

source="oracle_ebs_logs" AND (uri="/xmlpserver/*" OR uri="/bi/*") AND status>=200 AND status<300 AND user="-"

🔗 References

📤 Share & Export