...

Oracle Identity Flaw CVE-2025-61757 Actively Exploited.

The U.S. Cybersecurity and Infrastructure Security Agency issued an urgent warning on November 21, 2025, following confirmation that a critical vulnerability in Oracle Identity Manager is being actively exploited in the wild. The flaw, designated CVE-2025-61757, has been added to CISA’s Known Exploited Vulnerabilities catalog, with federal agencies ordered to patch affected systems by December 12, 2025.

Understanding the Oracle Identity Flaw and Its Critical Impact

The vulnerability carries a CVSS severity score of 9.8 out of 10, reflecting its potential to enable complete system takeovers. Affecting Oracle Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0, the flaw stems from missing authentication mechanisms within the REST WebServices component of Oracle Fusion Middleware. Security researchers Adam Kues and Shubham Shah from Searchlight Cyber discovered the vulnerability while investigating a separate Oracle Cloud breach that occurred earlier in 2025.

The researchers found that attackers could bypass authentication filters by appending metadata-style suffixes such as semicolons and WADL extensions to REST API URLs. This simple manipulation grants unauthorized access to privileged endpoints capable of executing arbitrary code on vulnerable systems. The ease of exploitation makes this Oracle Identity flaw particularly dangerous, as no credentials or prior system access are required to launch successful attacks.

Evidence of Zero-Day Exploitation Before Patch Release

Analysis of honeypot data from the SANS Internet Storm Center revealed multiple exploitation attempts between August 30 and September 9, 2025, well before Oracle issued a patch in its October 21, 2025 Critical Patch Update. The reconnaissance activity targeted specific API endpoints related to Groovy script compilation, with attackers using HTTP POST requests containing 556-byte payloads. Several IP addresses participated in these scanning operations, all employing identical user agents, which suggests coordinated reconnaissance by a single threat actor or group.

The timing of these attacks indicates that CVE-2025-61757 was exploited as a zero-day vulnerability for at least six weeks before patches became available. This pre-patch exploitation window allowed sophisticated threat actors, potentially including ransomware operators and state-backed advanced persistent threat groups, to compromise vulnerable Oracle Identity Manager deployments without detection.

Enterprise and Government Networks Face Immediate Risk

Oracle Identity Manager serves as the cornerstone of identity governance for numerous enterprise and government organizations worldwide. The platform manages user accounts, credentials, and access rights across complex IT environments, making it an exceptionally high-value target for attackers. A successful compromise of this centralized identity management system can rapidly escalate to domain-wide or cloud-wide breaches, providing attackers with the keys to an organization’s entire digital infrastructure.

The vulnerability poses particular risks to organizations that expose their Oracle Identity Manager instances to the internet for remote user access. Given that the Oracle Identity flaw requires no authentication to exploit, any network-accessible instance becomes an immediate target. Government agencies using Oracle Fusion Middleware, enterprises relying on centralized identity governance, and organizations running affected versions without the October 2025 security updates face severe operational risks.

Oracle’s Recent Security Challenges and Industry Implications

This critical vulnerability emerges during a challenging period for Oracle’s security posture. The company recently dealt with the fallout from the Clop ransomware gang’s campaign targeting Oracle E-Business Suite environments, which compromised dozens of organizations including insurance giant Allianz UK and The Washington Post. Additionally, a breach of Oracle Cloud’s login service earlier this year exposed over six million records and affected more than 140,000 Oracle Cloud tenants through exploitation of an older vulnerability, CVE-2021-35587.

Searchlight Cyber researchers noted that the newly discovered Oracle Identity flaw could have been used to breach the same login.us2.oraclecloud.com infrastructure affected in the previous incident, as it was running both Oracle Access Manager and Oracle Identity Manager. The pattern of vulnerabilities affecting core Oracle identity and access management components raises questions about secure development practices and the thoroughness of security reviews for Java-based authentication filters, which the researchers identified as a common source of authentication bypass flaws.

Immediate Action Required for Oracle Identity Manager Users

Organizations running affected Oracle Identity Manager versions must prioritize immediate patching. The vulnerability’s trivial exploitation methodology means that threat actors can weaponize the flaw with minimal effort, requiring only a single crafted HTTP request to gain remote system-level control. Security teams should deploy Oracle’s October 2025 Critical Patch Update without delay, review external exposure of identity services, and implement enhanced monitoring for suspicious access to administrative APIs and scripting features.

CISA’s binding operational directive requires federal civilian executive branch agencies to either apply patches, implement compensating controls for cloud services, or discontinue use of affected products by the December 12 deadline. Private sector organizations should adopt similar urgency, recognizing that active exploitation is confirmed and threat actors have demonstrated the capability to identify and compromise vulnerable systems. Network segmentation, enhanced logging of REST API access attempts, and correlation of indicators of compromise with internal security monitoring tools provide additional defensive layers while patching operations proceed.

The Oracle Identity flaw demonstrates the ongoing challenges organizations face in maintaining secure identity and access management infrastructure. As centralized identity platforms become increasingly critical to enterprise security architectures, vulnerabilities affecting these systems carry disproportionate risk. Organizations must ensure robust vulnerability management programs that prioritize identity infrastructure patching, implement defense-in-depth strategies to limit blast radius from authentication bypass vulnerabilities, and maintain vigilance for indicators of compromise that suggest exploitation attempts.

Must Read

Digital Banking Innovation Signature Bank Partners with Q2.

Understanding Digital Banking The financial services landscape is rapidly transforming,...

Arpio Azure Expands Cloud Disaster Recovery Service.

Arpio Azure Strengthens Cloud Disaster Recovery Capabilities Cloud disaster recovery...

AI-driven Fraud Earns Mitek Silver Medal.

AI-driven fraud Recognition Strengthens Digital Fraud Defender Leadership Mitek Systems,...

1Password Priceincrease Sparks Women’s Budget Concerns.

1Password priceincrease Raises Concerns Among Women Managing Digital Security The...

Digital Identity Partnership Sets New Security Standard.

Digital Identity Partnership Sets New Security Standard SLC Digital announced...

Topics

Digital Banking Innovation Signature Bank Partners with Q2.

Understanding Digital Banking The financial services landscape is rapidly transforming,...

Arpio Azure Expands Cloud Disaster Recovery Service.

Arpio Azure Strengthens Cloud Disaster Recovery Capabilities Cloud disaster recovery...

AI-driven Fraud Earns Mitek Silver Medal.

AI-driven fraud Recognition Strengthens Digital Fraud Defender Leadership Mitek Systems,...

1Password Priceincrease Sparks Women’s Budget Concerns.

1Password priceincrease Raises Concerns Among Women Managing Digital Security The...

Digital Identity Partnership Sets New Security Standard.

Digital Identity Partnership Sets New Security Standard SLC Digital announced...

CCTV Vulnerability Raises Women’s Safety Fears.

CCTV vulnerability threatens women’s personal and workplace safety CCTV vulnerability...

CCTV Vulnerability Exposes Honeywell Cameras.

CCTV vulnerability triggers urgent security response The CCTV vulnerability affecting...

Log Explorer Enhances Cloudflare Security.

Log Explorer Strengthens Integrated Security and Performance Cloudflare announced the...

Related Articles

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.