CVE-2025-61757

Analyzed
Published: 21 Oct 2025, 20:20
Last modified:24 Nov 2025, 13:38

Vulnerability Summary

Overall Risk
Critical Risk
81/100
AI Analysis
Emergency
Requires Immediate Action
AI Detection
Active in Wild
Exploitation Detected
CVSS Score
9.8 CRITICAL
CVSS v3.1 (ORACLE)
EPSS Score
71.16% CRITICAL
71% probability -10.21%
CISA KEV
Listed
Oracle
Ransomware
Known Use
Exploits
None found
Dark Web
Activity detected
Telegram
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Source Identifier: secalert_us@oracle.com
CVSSSourceSeverityExploit.ImpactVector
v4.0n/a
v3.1Primarysecalert_us@oracle.com9.8 CRITICAL3.95.9
CVSS:3.1/AV:N/AC:L/PR:N/U...
v3.0n/a
v2.0n/a
60.96%
Current Score
-10.21%
98%ile
Percentile Rank
-0.44%
Loading chart...
Loading chart...
Missing Authentication for Critical Function CWE-306
Description:The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Vulnerability Name:Oracle Fusion Middleware Missing Authentication for Critical Function Vulnerability
Added to CISA Catalog:21 Nov 2025, 00:00
Action Due:12 Dec 2025, 00:00
Known Ransomware: Ransomware
Required Action:Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Telegram Activity Detected
This vulnerability has been mentioned in monitored Telegram channels, indicating potential threat actor interest.

No known public exploit code indexed (as of 24 Nov 2025, 13:38).

Exploitation status can change quickly once PoC code appears.

Affected Configurations (CPE)

oracle identity_managerVulnerable
Version: 12.2.1.4.0
cpe:2.3:a:oracle:identity_manager:12.2.1.4.0:*:*:*:*:*:*:*
oracle identity_managerVulnerable
Version: 14.1.2.1.0
cpe:2.3:a:oracle:identity_manager:14.1.2.1.0:*:*:*:*:*:*:*
URLTagsSource
https://isc.sans.edu/diary/rss/32506-134c704f-9b21-4f2e-91b3-4a467353bcc0
https://isc.sans.edu/diary/rss/32506third party advisory134c704f-9b21-4f2e-91b3-4a467353bcc0
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-61757-134c704f-9b21-4f2e-91b3-4a467353bcc0
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-61757us government resource134c704f-9b21-4f2e-91b3-4a467353bcc0
https://www.oracle.com/security-alerts/cpuoct2025.html-secalert_us@oracle.com
https://www.oracle.com/security-alerts/cpuoct2025.htmlvendor advisorysecalert_us@oracle.com
© 2025 CveMate. All rights reserved.v0.1.4