Oracle patches EBS RCE flaw exploited in Clop extortion attacks

Oracle has patched a critical vulnerability in its E-Business Suite (EBS), tracked as CVE-2025-61882, which is being actively exploited in data theft attacks by the Clop ransomware group.

The flaw resides in the BI Publisher Integration component of Oracle Concurrent Processing, and allows for unauthenticated remote code execution. According to Oracle’s advisory, the vulnerability “may be exploited over a network without the need for a username and password,” potentially allowing attackers to execute arbitrary code on vulnerable systems.

CVE-2025-61882 affects Oracle E-Business Suite versions 12.2.3 through 12.2.14. Oracle has released an emergency patch but warns that customers must first apply the October 2023 Critical Patch Update to deploy the new fix.

Although Oracle has not officially labeled it a zero-day, the company released indicators of compromise (IOCs) tied to exploit activity recently shared by threat actors on Telegram.

Last week, Mandiant and Google’s Threat Intelligence Group reported a new Clop extortion campaign targeting EBS customers. Victims received ransom emails alleging that data had been stolen from their Oracle EBS systems, with the attackers threatening to leak the information unless their demands were met.

The Clop group has a long history of exploiting zero-day vulnerabilities in various software in wide-spread data extortion campaigns. Since 2020, the group has been observed targeting a slew of flaws in the Accellion FTA platform; SolarWinds Serv-U zero-day (CVE-2021-35211); GoAnywhere MFT zero-day (CVE-2023-0669); MOVEit Transfer zero-day; two Cleo file transfer zero-days (CVE-2024-50623 and CVE-2024-55956).

Back to the list

Latest Posts

Global malware campaign abusing legitimate Git utility

The campaign mainly delivers commodity malware, including info-stealers such as AgentTesla, FormBook, and Lumma Stealer.
14 January 2026

Microsoft’s January 2026 Patch Tuesday fixes over 100 security issues, one zero-day

ZDI said that CVE-2026-20805 was likely used in targeted attacks as part of a larger exploit chain.
14 January 2026

Russian hackers use PluggyApe backdoor to spy on Ukraine’s military

CERT-UA attributed the activity to a state-backed group known as Void Blizzard.
14 January 2026