CISA Adds Five Exploited Bugs Targeting Oracle and Microsoft

I’m thrilled to sit down with Dominic Jainy, a seasoned IT professional whose expertise spans artificial intelligence, machine learning, and blockchain. With a deep understanding of emerging technologies and their implications across industries, Dominic is uniquely positioned to shed light on the ever-evolving landscape of cybersecurity. Today, we’re diving into the recent updates to the U.S. Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities Catalog, exploring critical security flaws affecting major software systems, the risks they pose to organizations, and the broader implications for digital security.

Can you start by explaining the role of the U.S. Cybersecurity and Infrastructure Security Agency, or CISA, and why their Known Exploited Vulnerabilities Catalog is such a vital tool for organizations?

Absolutely. CISA is a federal agency responsible for protecting the nation’s critical infrastructure from cyber and physical threats. They play a key role in coordinating cybersecurity efforts, providing guidance, and sharing threat intelligence with both public and private sectors. The Known Exploited Vulnerabilities Catalog, or KEV, is a curated list of security flaws that are actively being exploited in the wild. It’s a wake-up call for organizations, signaling which vulnerabilities need immediate attention because attackers are already using them to breach systems. For federal agencies, it’s often tied to strict remediation deadlines, but it’s just as critical for private companies to act quickly to safeguard their networks.

What does it signify when CISA adds a new vulnerability to this catalog, and how should organizations interpret that action?

When a vulnerability lands on the KEV Catalog, it means CISA has confirmed evidence of active exploitation—real-world attacks are happening, not just theoretical risks. It’s a clear indicator of urgency. Organizations should see this as a directive to prioritize patching or mitigating that specific flaw because the likelihood of being targeted is significantly higher. It’s not just about awareness; it’s about action. Delaying could mean giving attackers an open door to sensitive data or critical systems.

Let’s dive into one of the recently added flaws, specifically CVE-2025-61884, which affects Oracle E-Business Suite. Can you break down what this vulnerability is and why it’s raising alarms?

Sure. CVE-2025-61884 is a server-side request forgery, or SSRF, vulnerability in the Runtime component of Oracle Configurator, part of the E-Business Suite. In simple terms, SSRF allows an attacker to trick a server into making unauthorized requests, potentially accessing internal systems or sensitive data. What makes this particularly concerning is that it can be exploited remotely without any authentication. That means an attacker doesn’t need credentials or insider access—they can strike from anywhere, making it a high-risk issue for any organization running this software.

Speaking of Oracle E-Business Suite, there’s another critical flaw, CVE-2025-61882, with a near-perfect CVSS score of 9.8. How does this vulnerability differ, and what makes its potential impact so severe?

CVE-2025-61882 is indeed a step up in terms of severity. Unlike the SSRF issue, this flaw allows unauthenticated attackers to execute arbitrary code on affected systems. That means they can run malicious commands, install malware, or take full control of the server. The CVSS score of 9.8 reflects its critical nature—easy to exploit, no authentication required, and devastating impact. While CVE-2025-61884 focuses on data access, this one opens the door to complete system compromise, which is why it’s such a massive concern for organizations.

Reports indicate that dozens of organizations may have already been impacted by the exploitation of CVE-2025-61882. What does this tell us about the scale and urgency of addressing such threats?

It’s a stark reminder of how quickly attackers can weaponize a vulnerability once it’s discovered. The fact that dozens of organizations are potentially affected shows that this isn’t a niche issue—it’s widespread and likely targeted by sophisticated actors. It underscores the urgency of patching immediately and the importance of proactive monitoring. If this many entities are already hit, it means exploit code is probably circulating widely, and more attacks are imminent unless defenses are shored up fast.

Shifting focus to another vulnerability in the catalog, CVE-2025-33073 affects Microsoft Windows SMB Client. Can you explain the nature of this flaw and the risks it introduces if exploited?

This vulnerability is an improper access control issue in the Windows SMB Client, which is used for file sharing over networks. If exploited, it can lead to privilege escalation, meaning an attacker could gain higher-level access than they’re supposed to have—potentially taking over a system or even a domain controller if certain conditions are met, like SMB signing not being enforced. The risk here is significant because it could allow attackers to move laterally within a network, accessing sensitive data or disrupting operations on a large scale.

Among the other flaws added, there are two affecting Kentico Xperience CMS, both with high CVSS scores. Can you describe what these vulnerabilities entail and why content management systems are often targeted?

Both CVE-2025-2746 and CVE-2025-2747 are authentication bypass flaws in Kentico Xperience CMS, specifically tied to how the Staging Sync Server handles passwords. Essentially, attackers can exploit these to gain control over administrative functions without needing valid credentials. CMS platforms are frequent targets because they often manage a company’s public-facing content—think websites or customer portals. Breaching them can lead to data theft, defacement, or even using the platform as a launchpad for broader attacks. Their high CVSS scores of 9.8 reflect how easily these flaws can be exploited and the damage they can cause.

What is your forecast for the future of cybersecurity threats, especially with vulnerabilities in widely used software like Oracle, Microsoft, and CMS platforms continuing to surface?

I think we’re going to see an escalation in both the frequency and sophistication of attacks targeting widely used software. These platforms are attractive because they’re deployed across countless organizations, offering a huge attack surface. As attackers leverage automation and AI to find and exploit flaws faster, the window between discovery and exploitation will keep shrinking. My forecast is that we’ll need a stronger focus on zero-trust architectures, real-time threat detection, and rapid patching cycles to stay ahead. Organizations that lag in adopting these practices will increasingly find themselves at risk, especially as nation-state actors and ransomware groups continue to refine their tactics.

Explore more

Trend Analysis: Agentic AI in Data Engineering

The modern enterprise is drowning in a deluge of data yet simultaneously thirsting for actionable insights, a paradox born from the persistent bottleneck of manual and time-consuming data preparation. As organizations accumulate vast digital reserves, the human-led processes required to clean, structure, and ready this data for analysis have become a significant drag on innovation. Into this challenging landscape emerges

Why Does AI Unite Marketing and Data Engineering?

The organizational chart of a modern company often tells a story of separation, with clear lines dividing functions and responsibilities, but the customer’s journey tells a story of seamless unity, demanding a single, coherent conversation with the brand. For years, the gap between the teams that manage customer data and the teams that manage customer engagement has widened, creating friction

Trend Analysis: Intelligent Data Architecture

The paradox at the heart of modern healthcare is that while artificial intelligence can predict patient mortality with stunning accuracy, its life-saving potential is often neutralized by the very systems designed to manage patient data. While AI has already proven its ability to save lives and streamline clinical workflows, its progress is critically stalled. The true revolution in healthcare is

Can AI Fix a Broken Customer Experience by 2026?

The promise of an AI-driven revolution in customer service has echoed through boardrooms for years, yet the average consumer’s experience often remains a frustrating maze of automated dead ends and unresolved issues. We find ourselves in 2026 at a critical inflection point, where the immense hype surrounding artificial intelligence collides with the stubborn realities of tight budgets, deep-seated operational flaws,

Trend Analysis: AI-Driven Customer Experience

The once-distant promise of artificial intelligence creating truly seamless and intuitive customer interactions has now become the established benchmark for business success. From an experimental technology to a strategic imperative, Artificial Intelligence is fundamentally reshaping the customer experience (CX) landscape. As businesses move beyond the initial phase of basic automation, the focus is shifting decisively toward leveraging AI to build