Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61757: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. in Oracle Corporation Identity Manager

0
Critical
VulnerabilityCVE-2025-61757cvecve-2025-61757
Published: Tue Oct 21 2025 (10/21/2025, 20:03:11 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Identity Manager

Description

Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

AI-Powered Analysis

AILast updated: 11/27/2025, 03:30:21 UTC

Technical Analysis

CVE-2025-61757 is a critical security vulnerability identified in Oracle Corporation's Identity Manager product, specifically affecting versions 12.2.1.4.0 and 14.1.2.1.0. The vulnerability exists in the REST WebServices component of Oracle Fusion Middleware. It allows an unauthenticated attacker with network access over HTTP to exploit the system without any prerequisites such as authentication or user interaction. The root cause is linked to CWE-306, indicating missing or insufficient authentication controls. Due to this flaw, an attacker can fully compromise the Identity Manager, resulting in complete takeover of the system. The CVSS 3.1 base score of 9.8 reflects the highest severity, with impacts across confidentiality, integrity, and availability. This means attackers can exfiltrate sensitive identity data, alter or delete identity information, and disrupt identity management services. The vulnerability is easily exploitable remotely, increasing the risk of rapid exploitation in unpatched environments. Although no public exploits have been reported yet, the critical nature and ease of exploitation make it a high-priority threat. Oracle has not yet published patches, so organizations must monitor for updates and apply them promptly once available. The vulnerability poses a significant risk to enterprise environments relying on Oracle Identity Manager for identity governance and administration, potentially enabling attackers to escalate privileges and move laterally within networks.

Potential Impact

For European organizations, the impact of CVE-2025-61757 is profound. Oracle Identity Manager is widely used in large enterprises and government agencies for identity governance, access management, and compliance. A successful attack could lead to unauthorized access to sensitive personal and corporate identity data, violating GDPR and other data protection regulations. The compromise of Identity Manager could allow attackers to manipulate user permissions, create backdoors, and disrupt authentication workflows, leading to broader network compromise and operational disruption. Critical sectors such as finance, healthcare, telecommunications, and public administration are particularly vulnerable due to their reliance on robust identity management. The availability impact could result in denial of identity services, affecting business continuity. The confidentiality breach could expose personal data of EU citizens, triggering regulatory penalties and reputational damage. Given the unauthenticated and network-accessible nature of the vulnerability, attackers could exploit it remotely, increasing the threat surface for European organizations with internet-facing Oracle Identity Manager instances.

Mitigation Recommendations

Immediate mitigation steps include: 1) Implement strict network segmentation and firewall rules to restrict access to Oracle Identity Manager REST WebServices only to trusted internal networks and management stations. 2) Monitor network traffic for unusual HTTP requests targeting Identity Manager endpoints to detect potential exploitation attempts. 3) Apply Oracle's security advisories and patches as soon as they are released; prioritize patching affected versions 12.2.1.4.0 and 14.1.2.1.0. 4) Employ Web Application Firewalls (WAFs) with custom rules to block suspicious unauthenticated HTTP requests to Identity Manager. 5) Conduct thorough audits of Identity Manager logs and configurations to identify any signs of compromise or unauthorized changes. 6) Enforce multi-factor authentication and least privilege principles for administrative access to Identity Manager to reduce impact if compromise occurs. 7) Establish incident response plans specific to identity management compromise scenarios. 8) Engage with Oracle support and subscribe to their security bulletins for timely updates. These targeted actions go beyond generic advice by focusing on access control, monitoring, and rapid patch deployment tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.556Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e6e

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 11/27/2025, 3:30:21 AM

Last updated: 12/6/2025, 10:24:20 AM

Views: 979

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats