InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted
Technology

Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted

October 20, 2025 3 Min Read
Share
Five new exploited bugs listed in CISA catalog - Oracle and Microsoft also targeted
SHARE

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) catalog, formally confirming that a recently disclosed vulnerability affecting Oracle E-Business Suite (EBS) has been weaponized in a real-world attack.

The security flaw in question is CVE-2025-61884 (CVSS score: 7.5), which describes a server-side request forgery (SSRF) vulnerability in the Oracle Configurator runtime component that could allow an attacker to gain unauthorized access to sensitive data.

“This vulnerability can be exploited remotely without authentication,” CISA said.

CVE-2025-61884 is the second flaw in Oracle EBS to be actively exploited, along with CVE-2025-61882 (CVSS score: 9.8), and is a critical bug that could allow an unauthenticated attacker to execute arbitrary code on a vulnerable instance.

Earlier this month, Google Threat Intelligence Group (GTIG) and Mandiant revealed that dozens of organizations may have been affected by exploits of CVE-2025-61882.

“While we are unable to determine at this time whether a specific exploit activity is the work of a specific attacker, it is likely that at least some of the exploit activity we observed was carried out by an actor currently conducting Cl0p-branded extortion operations,” Xander Wark, senior security engineer at GTIG, told Hacker News last week.

Four other vulnerabilities were added to the KEV catalog by CISA.

  • CVE-2025-33073 (CVSS Score: 8.8) – Improper access control vulnerability in Microsoft Windows SMB Client could allow privilege escalation (fixed by Microsoft in June 2025)
  • CVE-2025-2746 (CVSS Score: 9.8) – Authentication bypass using an alternate path or channel vulnerability in Kentico Xperience CMS could allow an attacker to take control of managed objects by leveraging the Staging Sync Server password handling of empty SHA1 usernames in Digest Authentication (fixed in Kentico in March 2025)
  • CVE-2025-2747 (CVSS Score: 9.8) – Authentication bypass using an alternate path or channel vulnerability in Kentico Xperience CMS could allow an attacker to take control of managed objects by leveraging the staging sync server’s password handling for the None type in the server definition (fixed in Kentico in March 2025)
  • CVE-2022-48503 (CVSS Score: 8.8) – Improper validation of array index vulnerability in Apple’s JavaScriptCore component could lead to arbitrary code execution when processing web content (fixed by Apple in July 2022)

Although details about how the four aforementioned issues are being exploited in the wild are currently unknown, details regarding CVE-2025-33073, CVE-2025-2746, and CVE-2025-2747 have been shared by researchers at Synacktiv and watchTowr Labs, respectively.

See also  North Korean hackers turn JSON service into covert malware delivery channel

Federal Civilian Executive Branch (FCEB) agencies must fix identified vulnerabilities by November 10, 2025 to protect their networks from active threats.

Share This Article
Twitter Copy Link
Previous Article The scariest roguelike card game you've ever played has reached its lowest price The scariest roguelike card game you’ve ever played has reached its lowest price
Next Article What was stolen from the Louvre? What was stolen from the Louvre?

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

2 Min Read
New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
Technology

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

4 Min Read
Malware Delivery Channels
Technology

North Korean hackers turn JSON service into covert malware delivery channel

3 Min Read
XWiki Servers
Technology

RondoDox exploits unpatched XWiki servers to draw more devices into botnet

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?