Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62475: Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle ZFS Storage Appliance Kit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle ZFS Storage Appliance Kit. in Oracle Corporation Oracle ZFS Storage Appliance Kit

0
Medium
VulnerabilityCVE-2025-62475cvecve-2025-62475
Published: Tue Oct 21 2025 (10/21/2025, 20:03:16 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle ZFS Storage Appliance Kit

Description

Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Core). The supported version that is affected is 8.8. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle ZFS Storage Appliance Kit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle ZFS Storage Appliance Kit. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 10/28/2025, 22:05:20 UTC

Technical Analysis

CVE-2025-62475 is a vulnerability in Oracle ZFS Storage Appliance Kit version 8.8, specifically in its core component. The flaw allows an attacker with high privileges and network access over HTTP to cause the appliance to hang or crash repeatedly, resulting in a complete denial of service (DoS). The vulnerability is easily exploitable given the low attack complexity (AC:L) and network attack vector (AV:N), but requires the attacker to already have high privileges (PR:H) on the system, which limits the initial attack surface. No user interaction is needed (UI:N), and the scope remains unchanged (S:U). The impact is solely on availability (A:H), with no confidentiality or integrity impact. This vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. Although no exploits are currently known in the wild and no patches have been released yet, the vulnerability poses a risk to the stability and availability of Oracle ZFS Storage Appliance Kit deployments. Organizations relying on this storage solution could experience significant service interruptions if exploited, especially in environments where high availability is critical. The vulnerability was published on October 21, 2025, and is assigned a CVSS 3.1 base score of 4.9, reflecting its medium severity primarily due to the requirement for high privileges and the limited impact scope.

Potential Impact

For European organizations, the primary impact of CVE-2025-62475 is the potential for denial of service on Oracle ZFS Storage Appliance Kit 8.8 devices. This can disrupt access to critical storage resources, affecting business continuity, data availability, and operational efficiency. Industries such as finance, telecommunications, healthcare, and government agencies that rely heavily on Oracle storage solutions for data integrity and uptime could face operational outages. The requirement for high privileges reduces the risk of remote exploitation by external attackers but raises concerns about insider threats or attackers who have already compromised internal systems. The lack of confidentiality and integrity impact means data breaches or data manipulation are not direct concerns from this vulnerability. However, repeated crashes or hangs could lead to cascading failures in dependent systems or delay critical data processing tasks. In regulated sectors, service disruptions could also lead to compliance issues and financial penalties. The absence of a patch at disclosure time necessitates immediate risk mitigation to prevent exploitation and maintain service availability.

Mitigation Recommendations

1. Restrict network access to the Oracle ZFS Storage Appliance Kit management interfaces, especially HTTP access, to trusted administrative networks only. 2. Implement strict access controls and monitoring to ensure only authorized high-privileged users can access the appliance. 3. Monitor appliance logs and performance metrics for signs of hangs, crashes, or abnormal behavior indicative of attempted exploitation. 4. Employ network segmentation to isolate storage appliances from general user networks and potential threat vectors. 5. Develop and test incident response plans specifically for storage appliance outages to minimize downtime impact. 6. Regularly review and update user privileges to reduce the number of high-privileged accounts and enforce least privilege principles. 7. Once Oracle releases a patch or update, prioritize its deployment in all affected environments. 8. Consider deploying additional redundancy or failover mechanisms to maintain availability during potential DoS events. 9. Engage with Oracle support for any available workarounds or mitigation guidance until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-10-14T19:46:33.406Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e97201721c03c6f13f06

Added to database: 10/21/2025, 8:13:38 PM

Last enriched: 10/28/2025, 10:05:20 PM

Last updated: 10/30/2025, 10:39:42 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats