Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

CISA: ‘Critical’ Flaw In Oracle Fusion Middleware Exploited In Attacks

CRN by CRN
November 24, 2025
Home News
Share on FacebookShare on Twitter


The ‘easily exploitable’ vulnerability impacts the Identity Manager tool within the Oracle enterprise integration platform, according to a disclosure.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) disclosed that a critical-severity flaw impacting Oracle’s Fusion Middleware platform has seen exploitation in cyberattacks.

The vulnerability (tracked as CVE-2025-61757) impacts the Identity Manager tool within Oracle Fusion Middleware, a platform that enables application development and provides functionality such as integrations between applications.

[Related: 10 Major Cyberattacks And Data Breaches In 2025 (So Far)]

The flaw was added Friday to CISA’s catalog of vulnerabilities known to have been exploited by threat actors, and has received a severity rating of 9.8 out of 10.0.

Oracle Fusion Middleware “contains a missing authentication for critical function vulnerability, allowing unauthenticated remote attackers to take over Identity Manager,” CISA wrote in the entry to the catalog, noting that it’s currently unknown whether the flaw has been utilized in ransomware attacks.

“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,” CISA wrote in its advisory, requiring federal agencies to implement fixes for the issue by Dec. 12.

While the order only applies to Federal Civilian Executive Branch agencies, CISA “strongly urges” all impacted organizations to prioritize remediation of exploited vulnerabilities such as this one, the agency said.

The “easily exploitable vulnerability” can be exploited by “an unauthenticated attacker with network access via HTTP to compromise Identity Manager,” an online disclosure about the vulnerability said.

CRN has reached out to Oracle for comment.



Source link

Tags: Cloud PlatformsCloud SoftwareCyberattacksCybersecuritySaaSVulnerabilities
CRN

CRN

Next Post
GDT awarded Americas I&MI Partner of the Year at Cisco Partner Summit 2025

GDT awarded Americas I&MI Partner of the Year at Cisco Partner Summit 2025

Recommended.

Vitria Outpaces Market Offerings with AI-Driven Innovation; Top-Tier Analysts Cite Multi-Year Lead in Autonomous Resolution

Vitria Outpaces Market Offerings with AI-Driven Innovation; Top-Tier Analysts Cite Multi-Year Lead in Autonomous Resolution

January 15, 2026
SUNMI ha sido nombrado socio Gold de Google Android Enterprise y obtuvo la certificación AER

SUNMI ha sido nombrado socio Gold de Google Android Enterprise y obtuvo la certificación AER

September 27, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio