Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets

 

On 14 October 2025, CISA reported the expansion of five vulnerabilities to its KEV catalog. 


CISA


+1


 These are imperfections that CISA has decided are being misused in the wild (or have a tall probability of abuse), and in this way carry lifted urgency.




According to CISA:




“These sorts of vulnerabilities are visit assault vectors for malevolent cyber performing artists and posture critical dangers to the government enterprise.” 


CISA


+1




This list is vital since once CISA includes a helplessness to KEV, government civilian organizations (in the U.S.) are required to fix or relieve it by a set due date — and private-sector associations ought to treat it as a beat need benchmark for their possess fixing and risk-management. 


Volmert


+1




The Five Vulnerabilities




Here are the five blemishes, with rundowns of each and why they’re significant.




CVE Affected product Nature of vulnerability Severity / notes


CVE-2025-61884 Oracle E‑Business Suite (EBS) – Runtime component of Prophet Configurator Server-Side Ask Imitation (SSRF). An unauthenticated assailant can make the helpless server send HTTP demands to inside or outside administrations, possibly bypassing organize division, getting to metadata or inner APIs. 


The Programmer News


+2


Volmert


+2


 CVSS 7.5 (as detailed) 


The Programmer News




CVE-2025-61882 Oracle EBS Remote Code Execution (RCE). A basic bug permitting unauthenticated assailants to execute self-assertive code on defenseless occurrences. 


The Programmer News


+1


 CVSS 9.8 (exceptionally tall) 


The Programmer News


+1




CVE-2025-33073 Microsoft Windows SMB Client Improper get to control powerlessness: nearby assailants (or through SMB client) may raise benefits. Implies horizontal development inside undertaking systems is conceivable. 


The Programmer News


+1


 CVSS 8.8 


The Programmer News




CVE-2025-2746 and CVE-2025-2747 Kenotic Experience CMS – Organizing Match up Server Two verification bypass vulnerabilities (through substitute ways or channels) that permit assailants to pick up regulatory control of the CMS by misusing how purge SHA1 usernames or “None” server-type are dealt with. 


The Programmer News


+1


 Both CVSS 9.8 


Volmert


+1




CVE-2022-48503 JavaScript Core (component utilized by Safari / WebCT, Apple Inc.) Improper approval of cluster file powerlessness. Can result in self-assertive code execution when malevolent web substance is handled. In spite of the fact that more seasoned (2022), CISA affirms it’s still being abused. 


Volmert


+1


 CVSS 8.8 


The Programmer News


Highlights & Observations




The incorporation of two partitioned blemishes in Prophet EBS (one SSRF, one RCE) is particularly eminent given the criticality of EBS in numerous undertaking landscapes.




The Microsoft SMB client imperfection underscores how common infrastructure/networking components stay high-value targets.




The Kenotic CMS vulnerabilities highlight that not fair tremendous sellers, but littler/ specialty endeavor applications moreover warrant critical attention.




The Apple/JavaScript Core blemish serves as a update that more seasoned, already-patched bugs can still posture live chance if frameworks stay unpatched.




According to detailing, the Prophet RCE (CVE-2025-61882) is as of now connected to extortion-style campaigns and may include performing artists related with the Cl0p-branded ransomware. 


The Programmer News


+1




Why this things (for organizations)




Active misuse affirmed: Incorporation in the KEV catalog implies there is confirmed or exceptionally likely misuse in the wild, which raises these blemishes from “patch when possible” to “patch immediately”.




High seriousness + wide reach: Numerous of the influenced items are broadly utilized in undertaking situations (Prophet EBS, Microsoft Windows SMB, Apple WebCT, Kenotic CMS).




Legacy and specialty computer program still powerless: The Kenotic and Apple things appear that it’s not fair “new” or “trending” computer program — indeed more seasoned hailed bugs or less-well-known frameworks can ended up vectors.




Regulatory and compliance suggestions: For U.S. government civilian organizations, there is a required remediation due date tied to these KEV postings. For private associations — particularly those working with government or in directed segments — falling behind might increment hazard of breach, obligation, and compliance violations.




Supply-chain/lateral development chance: For illustration, SSRF or SMB client acceleration bugs permit aggressors to turn inside inner systems, get to information stores, or proliferate along the side — so the hazard is not fair outside breach but more profound compromise.




Required activity steps & best practices




If you run any of the influenced items (or comparable endeavor frameworks), here are activity things to priorities:




Immediate steps




Identify whether you utilize any of these items (Prophet EBS, Windows SMB client forms, Kenotic Experience CMS, WebCT/Safari on undertaking devices).




Verify fix status: guarantee the vendor-supplied settle (or mitigations) for the particular CVE are applied.




For U.S. government civilian offices: guarantee remediation by the due date (in this case, — as detailed — November 10, 2025). 


The Programmer News


+1




For all associations: treat these vulnerabilities as priority-1 (most noteworthy urgency).




Segment business-critical applications from other arrange zones; uphold least-privilege access.




Enable monitoring/logging for anomalous behavior: active associations from application servers (demonstrative of SSRF), or irregular SMB client behavior (for benefit acceleration vectors).




Immediately debilitate or confine defenseless frameworks if a fix cannot be connected right absent — until mitigations can be implemented.




Ongoing and vital steps




Maintain a computer program stock / asset-management program so you know what frameworks you have, their fix status, and merchant back lifecycles.




Integrate powerlessness insights nourishes (such as CISA’s KEV catalog) into your patch-management and risk-prioritization process.




Apply micro-segmentation of systems, implement solid verification (MFA), and limit neighborhood chairman privileges.




For bequest frameworks, consider either updating, separating, or solidifying them forcefully — since more seasoned bugs stay a reasonable assault vector.




Conduct customary infiltration tests and threat-hunting with a center on sidelong development vectors (SSRF, SMB heightening, CMS authoritative takeover).




Maintain an occurrence reaction arrange that expects extortion/ransomware scenarios — since a few imperfections are connected with monetarily spurred risk actors.




Key take-aways




The unused clump of vulnerabilities illustrates that enterprise-grade applications (Prophet EBS, Microsoft Windows SMB, Kenotic CMS) stay prime targets for attackers.




Even more seasoned vulnerabilities (such as CVE-2022-48503) may stay dynamic dangers if frameworks are unpatched — so patch-age is not continuously a intermediary for risk.




Inclusion in CISA’s KEV catalog lifts a helplessness into the “must-address now” category. Associations ought to see these as basic pressing assignments — not fair “nice to have”.




Attackers are progressively leveraging chaining of vulnerabilities (e.g., beginning SSRF or powerless verification bypass, taken after by horizontal development, at that point information exfiltration/ransomware).




Effective cybersecurity requires not fair fixing, but asset-visibility, organize division, observing, occurrence preparation, and integration of threat-intelligence into operational workflows.

Post a Comment

0 Comments