Archive 2026-02-10

Tech Pulse Daily - October 16, 2025

Author

Dillip Chowdary

Founder & AI Researcher

Google Confirms Active Exploitation of Two Oracle Vulnerabilities

On October 16, 2025, Google's Threat Intelligence Group confirmed that CVE-2025-61884 and CVE-2025-61882 were exploited in the wild as zero-days. CVE-2025-61884 is a vulnerability in the Runtime user interface in the Oracle Configurator product of Oracle E-Business Suite (EBS), representing an "easily exploitable vulnerability [that] allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator".

🚨 Critical Vulnerability Details:

CVE-2025-61884

Product: Oracle Configurator (Oracle E-Business Suite)

Attack Vector: Network access via HTTP, no authentication required

Impact: Allows unauthenticated attackers to compromise Oracle Configurator

Exploitation Status: Confirmed exploited in the wild by Google TAG

CVE-2025-61882

Product: Oracle E-Business Suite

Exploitation Status: Confirmed exploited in the wild by Google TAG

Related Campaign: Associated with CVE-2025-61884 exploitation

⚠️ IMMEDIATE ACTION REQUIRED: Organizations running Oracle E-Business Suite should immediately apply available patches and review access logs for signs of compromise. The ease of exploitation and lack of authentication requirements make these vulnerabilities particularly dangerous for internet-facing EBS deployments.

This marks another significant supply chain security concern as Oracle E-Business Suite is widely deployed in enterprise environments for financial management, supply chain operations, and customer relationship management. The confirmation of active exploitation highlights the critical need for prompt patching of enterprise software vulnerabilities.

🚀 Tech News Delivered

Stay ahead of the curve with our daily tech briefings.

Share this update