Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61884: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. in Oracle Corporation Oracle Configurator

0
High
VulnerabilityCVE-2025-61884cvecve-2025-61884
Published: Sun Oct 12 2025 (10/12/2025, 02:34:51 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Configurator

Description

Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

AI-Powered Analysis

AILast updated: 10/12/2025, 03:11:10 UTC

Technical Analysis

CVE-2025-61884 is a vulnerability identified in the Oracle Configurator component of the Oracle E-Business Suite, specifically affecting versions 12.2.3 through 12.2.14. The flaw resides in the Runtime UI component and can be exploited remotely over HTTP without any authentication or user interaction, making it highly accessible to attackers with network access. The vulnerability allows attackers to bypass access controls and gain unauthorized access to critical or all data accessible via Oracle Configurator. The CVSS 3.1 base score of 7.5 reflects a high severity primarily due to the confidentiality impact, with no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. While no public exploits have been reported yet, the ease of exploitation and the critical nature of the data involved make this a significant threat. Oracle has not yet published patches or mitigation details, but organizations should anticipate updates and prepare to respond accordingly.

Potential Impact

For European organizations, the impact of CVE-2025-61884 can be severe, especially for those relying on Oracle Configurator within Oracle E-Business Suite for critical business processes. Unauthorized access to sensitive configuration data can lead to data breaches, intellectual property theft, and exposure of strategic business information. Although the vulnerability does not affect data integrity or system availability, the confidentiality breach alone can result in regulatory non-compliance, reputational damage, and financial losses under GDPR and other data protection laws. The ease of exploitation without authentication increases the risk of widespread attacks, particularly in environments where Oracle Configurator is exposed to untrusted networks or insufficiently segmented internal networks. Attackers could leverage the compromised data to facilitate further attacks or gain footholds in enterprise environments.

Mitigation Recommendations

1. Immediately restrict network access to Oracle Configurator interfaces, especially blocking HTTP access from untrusted networks and enforcing strict firewall rules. 2. Implement network segmentation to isolate Oracle Configurator servers from general user networks and the internet. 3. Monitor network traffic and logs for unusual or unauthorized access attempts targeting Oracle Configurator endpoints. 4. Apply Oracle-provided patches as soon as they become available; maintain close communication with Oracle support channels for updates. 5. Use web application firewalls (WAF) with custom rules to detect and block suspicious HTTP requests targeting Oracle Configurator. 6. Conduct internal audits to identify all instances of Oracle Configurator deployments and verify their version levels. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Consider temporary disabling or limiting Oracle Configurator functionality if feasible until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-10-03T06:59:29.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68eb18ce5baaa01f1c02ffa2

Added to database: 10/12/2025, 2:56:14 AM

Last enriched: 10/12/2025, 3:11:10 AM

Last updated: 10/12/2025, 6:32:48 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats