Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Elasticsearch Leak Exposes 6 Billion Information from Scraping, Previous and New Breaches

    October 21, 2025

    Claude Code involves net and cellular, letting devs launch parallel jobs on Anthropic’s managed infra

    October 21, 2025

    Future-Proofing Your AI Engineering Profession in 2026

    October 21, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»5 New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Amongst Targets
    AI Ethics & Regulation

    5 New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Amongst Targets

    Declan MurphyBy Declan MurphyOctober 20, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    5 New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Amongst Targets
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Oct 20, 2025Ravie LakshmananMenace Intelligence / Knowledge Safety

    The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Monday added 5 safety flaws to its Identified Exploited Vulnerabilities (KEV) Catalog, formally confirming a not too long ago disclosed vulnerability impacting Oracle E-Enterprise Suite (EBS) has been weaponized in real-world assaults.

    The safety defect in query is CVE-2025-61884 (CVSS rating: 7.5), which has been described as a server-side request forgery (SSRF) vulnerability within the Runtime element of Oracle Configurator that might enable attackers unauthorized entry to essential information.

    “This vulnerability is remotely exploitable with out authentication,” CISA stated.

    DFIR Retainer Services

    CVE-2025-61884 is the second flaw in Oracle EBS to be actively exploited together with CVE-2025-61882 (CVSS rating: 9.8), a essential bug that might allow unauthenticated attackers to execute arbitrary code on vulnerable cases.

    Earlier this month, Google Menace Intelligence Group (GTIG) and Mandiant revealed dozens of organizations could have been impacted following the exploitation of CVE-2025-61882.

    “Presently, we’re not capable of attribute any particular exploitation exercise to a selected actor, however it’s seemingly that at the very least a number of the exploitation exercise we noticed was performed by actors now conducting Cl0p-branded extortion operations,” Zander Work, senior safety engineer at GTIG, advised The Hacker Information final week.

    Additionally added by CISA to the KEV catalog are 4 different vulnerabilities –

    • CVE-2025-33073 (CVSS rating: 8.8) – An improper entry management vulnerability in Microsoft Home windows SMB Shopper that might enable for privilege escalation (Fastened by Microsoft in June 2025)
    • CVE-2025-2746 (CVSS rating: 9.8) – An authentication bypass utilizing an alternate path or channel vulnerability in Kentico Xperience CMS that might enable an attacker to manage administrative objects by profiting from the Staging Sync Server password dealing with of empty SHA1 usernames in digest authentication (Fastened in Kentico in March 2025)
    • CVE-2025-2747 (CVSS rating: 9.8) – An authentication bypass utilizing an alternate path or channel vulnerability in Kentico Xperience CMS that might enable an attacker to manage administrative objects by profiting from the Staging Sync Server password dealing with for the server outlined None sort (Fastened in Kentico in March 2025)
    • CVE-2022-48503 (CVSS rating: 8.8) – An improper validation of array index vulnerability in Apple’s JavaScriptCore element that might lead to arbitrary code execution when processing internet content material (Fastened by Apple in July 2022)
    CIS Build Kits

    There are presently no particulars on how the aforementioned 4 points are being exploited within the wild, though particulars about CVE-2025-33073, CVE-2025-2746, and CVE-2025-2747 have been shared by researchers from Synacktiv and watchTowr Labs, respectively.

    Federal Civilian Govt Department (FCEB) businesses are required to remediate recognized vulnerabilities by November 10, 2025, to safe their networks towards lively threats.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Elasticsearch Leak Exposes 6 Billion Information from Scraping, Previous and New Breaches

    October 21, 2025

    131 Malicious Chrome Extensions Found Focusing on WhatsApp Customers – GBHackers Safety

    October 20, 2025

    China wirft den USA Cyberangriffe auf Zeitbehörde vor

    October 20, 2025
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Elasticsearch Leak Exposes 6 Billion Information from Scraping, Previous and New Breaches

    By Declan MurphyOctober 21, 2025

    A misconfigured Elasticsearch server holding 1.12 terabytes of knowledge was leaking greater than 6 billion…

    Claude Code involves net and cellular, letting devs launch parallel jobs on Anthropic’s managed infra

    October 21, 2025

    Future-Proofing Your AI Engineering Profession in 2026

    October 21, 2025

    Past Vector Search: 5 Subsequent-Gen RAG Retrieval Methods

    October 21, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.