Skip to content

Urgent: Oracle EBS Customers at Risk - Act Now to Patch Critical RCE Vulnerability

Clop gang's exploit leak increases risk. Oracle EBS customers must patch immediately and assess for compromise.

In this image there is a soap which is covered with the brown colour cover and there is a soap...
In this image there is a soap which is covered with the brown colour cover and there is a soap beside it.

Urgent: Oracle EBS Customers at Risk - Act Now to Patch Critical RCE Vulnerability

Oracle E-Business Suite (EBS) customers are urged to act swiftly following warnings from the UK's National Cyber Security Centre (NCSC) and Google's Mandiant group. A critical vulnerability (CVE-2025-61882) in versions 12.2.3 to 12.2.14 allows unauthenticated remote code execution, leading to full system compromise with no user interaction required. The exploit used by the Clop gang has been leaked, increasing the risk of further attacks.

Affected customers should immediately install the emergency security update published by Oracle to patch the vulnerability. The NCSC advises performing a compromise assessment using IoCs published in Oracle's advisory and contacting Oracle's PSIRT and the NCSC if compromise is suspected. To minimize risk, reduce the number of Oracle EBS instances directly accessible from the public internet, and follow Oracle's deployment guidelines when exposure is necessary. Oracle EBS customers should also conduct threat hunting to detect any potential malicious activity since August 2025. Specific companies attacked by Clop ransomware through this vulnerability before the July 2025 update are not explicitly named, but instances were exploited starting in August 2025.

The leak of the Clop gang's exploit by the Scattered Lapsus$ Hunters threat group has heightened the urgency for Oracle EBS customers to apply the security update. Failure to do so leaves systems vulnerable to full compromise with no user interaction required. The NCSC's guidance on compromise assessment and threat hunting should be followed to ensure the security of affected systems.

Read also:

Latest