Oracle Revises Statement After Clop Zero-Day Exploit
Oracle Revises Statement After Clop Zero-Day Exploit

Oracle Revises Statement After Clop Zero-Day Exploit

News summary

Oracle released emergency patches for a critical zero-day, CVE-2025-61882, in E-Business Suite (BI Publisher Integration/Oracle Concurrent Processing) that allows unauthenticated remote code execution in versions 12.2.3–12.2.14 and is rated CVSS 9.8. Investigators including Google/Mandiant say the flaw has been actively exploited by the Clop ransomware group since August 2025 to steal large volumes of corporate data and run an email-based extortion campaign that targeted corporate executives. Oracle initially pointed to previously patched July vulnerabilities but revised its statement after the new zero-day was linked to the attacks and published indicators of compromise and updated fixes. Security firms including Mandiant and watchTowr warn working exploit code has leaked, lowering the barrier to additional actors and raising the risk of mass exploitation and overlapping activity with groups such as Scattered Lapsus$ Hunters. Oracle is urging customers to apply the emergency updates immediately and to investigate whether they have already been compromised, noting thousands of organizations use E-Business Suite to store critical HR and customer data.

Story Coverage
Bias Distribution
50% Center
Information Sources
bfb2a97b-336e-48d9-b69a-147df7862dc251dae2ab-6a3f-4156-b4a8-805de03e2b50
Left 50%
Center 50%
Coverage Details
Total News Sources
2
Left
1
Center
1
Right
0
Unrated
0
Last Updated
9 days ago
Bias Distribution
50% Center
Related News
Ask VT AI
Story Coverage
Subscribe

Stay in the know

Get the latest news, exclusive insights, and curated content delivered straight to your inbox.

Present

Gift Subscriptions

The perfect gift for understanding
news from all angles.

Related News
Recommended News