Home » Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

by Priya Kapoor
2 minutes read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has once again highlighted the evolving landscape of cybersecurity threats by adding five newly discovered security vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Among these vulnerabilities, one that stands out is the recently disclosed flaw affecting Oracle E-Business Suite (EBS), officially identified as CVE-2025-61884 with a CVSS score of 7.5.

This addition to the KEV Catalog underscores the critical importance of promptly addressing vulnerabilities to prevent real-world exploitation. The fact that this particular vulnerability has been weaponized in active attacks serves as a stark reminder of the ever-present risks faced by organizations utilizing Oracle E-Business Suite.

Oracle EBS is a widely used suite of business applications that form the backbone of numerous enterprises, making any vulnerability within its ecosystem a matter of significant concern. With the potential for exploitation in the wild, organizations relying on Oracle EBS must prioritize patching and mitigation efforts to safeguard their systems and data.

In addition to Oracle EBS, the KEV Catalog update includes other vulnerabilities affecting prominent technology companies such as Microsoft. The presence of these vulnerabilities serves as a wake-up call for organizations across industries to stay vigilant and proactive in their cybersecurity measures.

As IT and development professionals, it is crucial to stay informed about the latest security threats and vulnerabilities, especially those actively exploited in the wild. Proactive monitoring of security advisories from trusted sources like CISA can provide valuable insights into emerging risks and the necessary actions to mitigate them.

One of the key strategies in addressing known vulnerabilities is timely patching and applying security updates provided by vendors. By ensuring that systems are up to date with the latest patches, organizations can significantly reduce their exposure to potential exploits and enhance their overall security posture.

Moreover, conducting regular security assessments, penetration testing, and vulnerability scanning can help proactively identify and address weaknesses within IT environments. By taking a proactive and holistic approach to cybersecurity, organizations can better protect themselves against both known and emerging threats.

In conclusion, the addition of new exploited bugs to CISA’s KEV Catalog serves as a stark reminder of the dynamic nature of cybersecurity threats. IT and development professionals must remain vigilant, stay informed about the latest vulnerabilities, and take proactive steps to secure their systems and data. By prioritizing cybersecurity measures and adopting a proactive security stance, organizations can effectively mitigate risks and safeguard their digital assets in an increasingly hostile cyber landscape.

You may also like