CVE Alert: CVE-2025-61756 – Oracle Corporation – Oracle Financial Services Analytical Applications Infrastructure

CVE-2025-61756

HIGHNo exploitation known

Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: System Configuration). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Oracle Corporation
Product
Oracle Financial Services Analytical Applications Infrastructure
Versions
8.0.7.9 | 8.0.8.7 | 8.1.2.5
CWE
Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure.
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-21T22:35:34.981Z
Updated
2025-10-21T22:35:34.981Z

AI Summary Analysis

Risk verdict

High risk: unauthenticated remote Denial-of-Service via HTTP; urgency depends on KEV/EPSS signals which are not provided here.

Why this matters

Successful exploitation can render the affected infrastructure unavailable, disrupting critical financial analytics, reporting, and risk workloads. In environments where HTTP endpoints are exposed to networks (internal or cloud), an attacker could cause sustained outages with minimal effort.

Most likely attack path

Exploitation requires only network access to the HTTP interface, with no privileges or user interaction. An attacker can trigger resource exhaustion from crafted requests, leading to a hang or frequent crashes, with availability as the primary impact and no direct data compromise.

Who is most exposed

Organisations running analytics or risk-management platforms in financial services, particularly where data-processing services expose HTTP endpoints to internal networks or the internet, are most at risk. Cloud or on‑prem deployments with exposed management interfaces are common patterns.

Detection ideas

  • Sudden spikes in CPU/memory and repeated service restarts following HTTP requests.
  • Crash dumps or process terminations linked to specific endpoints.
  • Increased HTTP error rates (500s) without authentication attempts.
  • Logs showing repeated, similar HTTP requests to the vulnerable path.
  • Alerting on service unavailability or heartbeat failures.

Mitigation and prioritisation

  • Apply vendor-published patch or upgrade to the latest patched release; test in staging before production.
  • Implement network access controls: restrict HTTP access, enforce least privilege, and apply rate limiting/WAF rules.
  • Segregate affected services from critical workloads; use network segmentation and failover testing.
  • Establish a patch timeline with Change Management; have a rollback plan.
  • If KEV is true or EPSS ≥ 0.5 (data not provided here), treat as priority 1. Otherwise, prioritise as high until patching completes.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features