Home » Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

by Lila Hernandez
2 minutes read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently made waves in the tech world by adding five new security vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Among these, one particularly concerning flaw has been confirmed to affect Oracle E-Business Suite (EBS) and has already been exploited in real-world cyber attacks.

CVE-2025-61884, with a CVSS score of 7.5, has emerged as a significant threat. This vulnerability, once exploited, could potentially lead to severe consequences, compromising the security and integrity of systems running Oracle EBS. With the ever-increasing sophistication of cyber threats, such exploits underscore the critical need for organizations to prioritize robust cybersecurity measures.

Oracle, a major player in the tech industry, is not alone in facing these challenges. Microsoft, another tech giant, also finds itself among the targets of these newly identified vulnerabilities. This serves as a stark reminder that even organizations with substantial resources and expertise are not immune to cyber risks.

In light of these developments, IT and cybersecurity professionals must remain vigilant and proactive in addressing potential vulnerabilities within their systems. Regular security assessments, prompt patching of software, and ongoing monitoring for unusual activities are essential practices to mitigate the risks posed by these exploits.

Moreover, collaboration and information-sharing within the tech community are vital in combating cyber threats effectively. By staying informed about the latest vulnerabilities and security best practices, organizations can enhance their defenses and better protect against potential attacks.

As the digital landscape continues to evolve, staying ahead of cyber threats necessitates a collective effort. The inclusion of these newly exploited bugs in CISA’s catalog serves as a call to action for the tech industry to prioritize cybersecurity and work together towards a more secure digital ecosystem.

In conclusion, the recent additions to CISA’s Known Exploited Vulnerabilities Catalog highlight the ongoing challenges posed by cyber threats. By acknowledging these vulnerabilities, taking proactive measures to address them, and fostering collaboration within the tech community, organizations can strengthen their defenses and safeguard against potential attacks. Stay informed, stay vigilant, and stay secure in the ever-evolving digital world.

You may also like