On October 20, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling they are under active exploitation by malicious actors. The flaws, identified as CVE-2022-48503, CVE-2025-2746, CVE-2025-2747, CVE-2025-33073, and CVE-2025-61884, impact products from Apple, Kentico, Microsoft, and Oracle. The inclusion in the KEV catalog under Binding Operational Directive (BOD) 22-01 mandates that Federal Civilian Executive Branch (FCEB) agencies remediate these vulnerabilities by a specified deadline. CISA strongly recommends that private sector organizations also prioritize these patches to defend against prevalent attack vectors. The vulnerabilities range from authentication bypass and improper access control to server-side request forgery (SSRF), posing significant risks if left unpatched.
The five vulnerabilities represent a diverse set of attack vectors targeting different layers of the technology stack:
CVE-2025-33073: An Improper Access Control Vulnerability in Microsoft Windows SMB Client. This type of flaw could potentially allow an attacker to bypass security controls and gain unauthorized access to system resources, possibly leading to privilege escalation or lateral movement within a network.CVE-2025-61884: A Server-Side Request Forgery (SSRF) vulnerability in Oracle's E-Business Suite. SSRF flaws allow an attacker to induce the server-side application to make requests to an unintended location, which can be used to pivot into internal networks, scan for open ports, or exfiltrate data.CVE-2025-2746 & CVE-2025-2747: A pair of Authentication Bypass vulnerabilities in the Kentico Xperience Staging Sync Server. These flaws could permit an unauthenticated attacker to bypass login mechanisms, granting them unauthorized access to the staging server, which often contains sensitive pre-production data and configurations.CVE-2022-48503: An older but newly exploited vulnerability affecting multiple Apple products. The specifics of this flaw were not detailed in the alert, but its inclusion indicates threat actors have developed a reliable exploit for it, targeting unpatched Apple devices.The vulnerabilities impact a broad range of enterprise and consumer products. Organizations should conduct immediate asset inventory checks to identify the presence of the following systems:
CVE-2022-48503. Organizations should consult Apple's security advisories for this CVE to identify specific vulnerable devices and OS versions.CVE-2025-2746 and CVE-2025-2747.CVE-2025-33073.CVE-2025-61884 should be confirmed via Oracle's security advisories.CISA has confirmed that all five vulnerabilities have been actively exploited in the wild. The 'in-the-wild' exploitation status dramatically increases the urgency for patching. Threat actors are leveraging these flaws in real-world attacks, meaning theoretical risk has become an immediate danger. While the specific threat actors were not named, vulnerabilities like these are commonly used by a wide range of adversaries, from ransomware groups for initial access to state-sponsored actors for espionage.
Exploitation of these vulnerabilities can lead to severe consequences:
CVE-2025-33073) and the Kentico authentication bypass (CVE-2025-2746/2747) can serve as entry points into a network or facilitate movement between systems.CVE-2025-61884) is a powerful tool for attackers to map internal networks and steal sensitive data from backend systems that are not directly exposed to the internet.Security teams should proactively hunt for signs of exploitation. While specific IOCs were not provided, hunting can be based on vulnerability characteristics.
CVE-2025-61884 (Oracle SSRF): Monitor web server logs for the Oracle E-Business Suite for unusual outbound requests originating from the server itself. Look for connections to internal, non-standard ports or requests to public cloud metadata services (e.g., 169.254.169.254). This is a key D3FEND technique: D3-NTA: Network Traffic Analysis.CVE-2025-33073 (Windows SMB): Analyze SMB client logs and network traffic for anomalous connection patterns. Monitor endpoint security logs for suspicious processes initiating SMB connections. This aligns with D3-PA: Process Analysis.CVE-2025-2746/2747 (Kentico Auth Bypass): Review access logs for the Kentico Xperience Staging Sync Server. Look for successful authentication events from unknown IP addresses or activity on the server that does not correlate with legitimate user sessions.CISA's primary directive is to apply vendor-provided patches immediately. Organizations should follow this risk-based prioritization:
TCP port 445) at the network perimeter. This is a form of D3FEND's D3-ITF: Inbound Traffic Filtering.The primary mitigation is to apply vendor-supplied patches to eliminate the vulnerabilities.
Mapped D3FEND Techniques:
Restrict access to vulnerable services from the internet, especially administrative interfaces like the Kentico Staging Sync Server.
Mapped D3FEND Techniques:
Immediately prioritize and deploy the security patches released by Apple, Kentico, Microsoft, and Oracle for the five specified CVEs. Utilize automated patch management systems to ensure comprehensive coverage across all endpoints, servers, and devices. For the Oracle E-Business Suite and Kentico Xperience servers, which are high-value targets, schedule emergency maintenance windows to apply updates. Post-patching, run authenticated vulnerability scans to verify that the patches have been applied correctly and the vulnerabilities are fully remediated. This is the most effective defense against exploitation.
As a compensating control, especially for the web-facing Oracle and Kentico vulnerabilities, implement strict inbound traffic filtering. Configure perimeter firewalls and web application firewalls (WAFs) to restrict all access to the application management interfaces, allowing connections only from a small set of explicitly approved internal IP addresses (e.g., administrator jump boxes). For the Oracle SSRF flaw, configure WAF rules to inspect and block request patterns that attempt to access internal IP ranges or cloud metadata services. This isolates the vulnerable application from general internet traffic, significantly reducing the attack surface.
Deploy network traffic analysis tools to monitor for post-exploitation activity related to the SSRF vulnerability (CVE-2025-61884). Specifically, establish a baseline of normal outbound traffic from the Oracle E-Business Suite server. Configure alerts for any connections initiated from this server to internal systems, especially database servers, domain controllers, or file shares that it does not normally communicate with. Also, monitor for any outbound connections to unusual external IP addresses or known malicious domains, as this could indicate C2 communication or data exfiltration following a successful SSRF attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats