Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61751: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. in Oracle Corporation Oracle Financial Services Analytical Applications Infrastructure

0
High
VulnerabilityCVE-2025-61751cvecve-2025-61751
Published: Tue Oct 21 2025 (10/21/2025, 20:03:09 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Financial Services Analytical Applications Infrastructure

Description

Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

AI-Powered Analysis

AILast updated: 10/28/2025, 21:17:37 UTC

Technical Analysis

CVE-2025-61751 is a vulnerability identified in Oracle Financial Services Analytical Applications Infrastructure, specifically affecting versions 8.0.7.9, 8.0.8.7, and 8.1.2.5. The flaw allows an attacker with low privileges and network access via HTTP to compromise the system, leading to unauthorized creation, deletion, or modification of critical data. The vulnerability stems from improper authorization checks (CWE-862), enabling privilege escalation or unauthorized data manipulation. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality (C:H) and integrity (I:H) is high, while availability (A:N) is unaffected. This means attackers can exfiltrate or alter sensitive financial data without disrupting service availability. The vulnerability affects critical financial analytical infrastructure, potentially exposing sensitive financial data and analytics used by banks and financial institutions. Although no exploits are currently known in the wild, the ease of exploitation and the critical nature of the data involved make this a significant threat. Oracle has not yet published patches, so organizations must monitor for updates and implement interim mitigations.

Potential Impact

For European organizations, especially those in the financial sector, this vulnerability poses a significant risk. Oracle Financial Services Analytical Applications Infrastructure is widely used by banks and financial institutions for risk analysis, compliance, and financial reporting. Exploitation could lead to unauthorized data manipulation or theft, undermining data integrity and confidentiality, which could result in regulatory penalties, financial loss, reputational damage, and operational disruption. Given the sensitivity of financial data, unauthorized access could also facilitate fraud or insider trading. The lack of impact on availability means attackers can remain stealthy, increasing the risk of prolonged undetected compromise. Organizations in Europe must consider the potential for targeted attacks by threat actors seeking financial data or to disrupt financial markets.

Mitigation Recommendations

1. Monitor Oracle's official channels closely for the release of security patches addressing CVE-2025-61751 and apply them promptly. 2. Restrict network access to Oracle Financial Services Analytical Applications Infrastructure servers by implementing strict firewall rules, allowing only trusted IP addresses and internal network segments. 3. Employ network segmentation to isolate critical financial analytical systems from general corporate networks and internet-facing services. 4. Conduct thorough access reviews to ensure that users have the minimum necessary privileges, reducing the risk posed by low-privileged attackers. 5. Implement robust logging and monitoring focused on unusual data access or modification activities within the Oracle infrastructure to detect potential exploitation attempts early. 6. Use Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with updated signatures to detect and block suspicious HTTP requests targeting this vulnerability. 7. Educate security teams about the vulnerability specifics to enhance incident response readiness. 8. Consider deploying network-level anomaly detection tools to identify unusual traffic patterns indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.555Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e5f

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 10/28/2025, 9:17:37 PM

Last updated: 10/29/2025, 7:03:43 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats