Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61757: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. in Oracle Corporation Identity Manager

0
Critical
VulnerabilityCVE-2025-61757cvecve-2025-61757
Published: Tue Oct 21 2025 (10/21/2025, 20:03:11 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Identity Manager

Description

Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:54:46 UTC

Technical Analysis

CVE-2025-61757 is a critical security vulnerability discovered in Oracle Corporation's Identity Manager product, specifically within the REST WebServices component of Oracle Fusion Middleware. The affected versions are 12.2.1.4.0 and 14.1.2.1.0. The vulnerability is classified under CWE-306, indicating missing or insufficient authentication mechanisms. It allows an unauthenticated attacker who has network access via HTTP to exploit the flaw without any user interaction or prior authentication. The attacker can leverage this vulnerability to gain full control over the Identity Manager system, effectively taking over the identity and access management platform. This can lead to unauthorized access, manipulation, or deletion of identity data, and disruption of service availability. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with impacts rated high across confidentiality, integrity, and availability. The vulnerability is easily exploitable due to low attack complexity and no required privileges, making it a prime target for attackers. Although no public exploits have been reported yet, the potential for rapid exploitation is significant. Oracle has not yet published patches or mitigations, so organizations must be vigilant and prepare to deploy fixes promptly once available. This vulnerability threatens the core security infrastructure of organizations relying on Oracle Identity Manager for identity governance and administration.

Potential Impact

The impact of CVE-2025-61757 is severe and far-reaching for organizations worldwide that utilize Oracle Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0. Successful exploitation results in complete compromise of the Identity Manager system, which is central to managing user identities, roles, and access permissions. Attackers gaining control can create, modify, or delete user accounts, escalate privileges, and bypass security controls, leading to widespread unauthorized access across enterprise systems. This can facilitate data breaches, insider threat impersonation, and disruption of critical business processes. The availability of the identity management service can also be impacted, potentially causing denial of service conditions. Given the critical role of identity management in enforcing security policies, this vulnerability undermines the foundational security posture of affected organizations. The ease of exploitation and lack of authentication requirements increase the likelihood of attacks, potentially targeting high-value sectors such as finance, government, healthcare, and technology. The absence of known exploits currently provides a narrow window for remediation before attackers develop and deploy exploit code.

Mitigation Recommendations

1. Monitor Oracle’s official security advisories closely for the release of patches addressing CVE-2025-61757 and apply them immediately upon availability. 2. Until patches are available, restrict network access to the Oracle Identity Manager REST WebServices interface by implementing network segmentation and firewall rules to limit HTTP access only to trusted management networks. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP requests targeting the Identity Manager REST endpoints. 4. Conduct thorough audits of Identity Manager logs to detect unusual or unauthorized access attempts, focusing on anomalous HTTP requests and failed authentication attempts. 5. Implement strict network-level access controls such as VPNs or zero-trust segmentation to reduce exposure of the Identity Manager interface to untrusted networks. 6. Review and harden identity and access management policies to minimize potential damage in case of compromise, including enforcing least privilege and multi-factor authentication for administrative accounts. 7. Prepare incident response plans specific to identity management compromise scenarios to enable rapid containment and recovery. 8. Engage with Oracle support for guidance and potential workarounds until official patches are released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.556Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e6e

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 2/27/2026, 5:54:46 AM

Last updated: 3/25/2026, 12:42:17 AM

Views: 1318

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses