Fixing and finding
Jump to remediation plan
CVE ID

CVE-2025-61757

Published 2025-10-22
Updated 6 months ago
Vendor/s
Oracle
Product/s
Fusion Middleware
Version/s
12.2.1.4.0
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
9.8
/ 10
Critical
Severity Details
Base score
9.8 Critical
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

Critical 9.8 CVSS vulnerability in Oracle Identity Manager allows unauthenticated remote takeover. Act now to patch affected versions 12.2.1.4.0 and 14.1.2.1.0.

CPE

Oracle logo
Oracle
Product Version Start Version End (excl.) Status
identity_manager 12.2.1.4.0 12.2.1.4.0 vulnerable
identity_manager 14.1.2.1.0 14.1.2.1.0 vulnerable

Related weakness (CWE)

CWE-306

Remediation plan

1

Apply official patches

Download and apply the security updates provided in the Oracle Critical Patch Update (CPU) for October 2025 or later to address the vulnerability in the REST WebServices component.

2

Update affected systems

Verify if you are running Oracle Identity Manager versions 12.2.1.4.0 or 14.1.2.1.0 and upgrade to the latest patched minor version or apply the specific security overlay recommended by Oracle.

3

Restrict access

Use firewalls or access control lists (ACLs) to restrict network access to the Identity Manager REST endpoints, ensuring they are not exposed to the public internet and are only accessible from trusted management segments.

4

Monitor for exploitation

Audit HTTP logs for unauthorized access to REST API paths and monitor for anomalous administrative activities, such as the creation of new privileged accounts or unexpected changes to identity policies.

Detection Guidance

Monitor web server and application logs for suspicious HTTP POST or GET requests targeting Identity Manager REST endpoints, specifically looking for requests that lack valid authentication tokens. Implement NIDS signatures to detect exploitation attempts related to CWE-306. Additionally, track any unusual outbound network connections from the Fusion Middleware host and monitor for unauthorized changes to the underlying identity store or LDAP directory, which could indicate a successful system takeover.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management