Zero-day

Broadcom Reportedly Hit By Clop Ransomware Through Oracle E-Business Suite Zero-Day Vulnerability

The Cl0p ransomware group claimed responsibility for breaching Broadcom, a major semiconductor firm, by exploiting a zero-day flaw in Oracle E-Business Suite.

This incident fits into Cl0p’s broad campaign targeting enterprise systems since August 2025. Broadcom confirmed targeting but stated it patched the vulnerability after forensic review.​

Security analysts noted the attack around November 20, 2025, with Cl0p listing Broadcom on its data leak site.

Hackmanac issued an early alert based on clear and dark web sources, flagging cybercrime risks to the manufacturing sector.

The breach remains pending independent verification as Broadcom handles internal remediation.

Technical Breakdown

Cl0p actors used CVE-2025-61882, a critical unauthenticated remote code execution vulnerability in Oracle E-Business Suite’s Concurrent Processing component.

Attackers sent POST requests to /OA_HTML/SyncServlet, then leveraged XDO Template Manager to inject malicious templates into the EBS database.

A final Template Preview request triggered the payload, granting complete system control.

Exploitation began as a zero-day vulnerability weeks before Oracle’s October 2025 patches, allowing data exfiltration from the supply chain and financial systems.

Cl0p combined this with tools such as the in-memory Java loader, GOLDVEIN.JAVA, for persistence and lateral movement.

Organizations began receiving extortion emails from compromised third-party accounts on September 29, 2025.

CVE IDAffected ProductCVSS ScoreImpactExploit Prerequisites
CVE-2025-61882 Oracle E-Business Suite (Concurrent Processing)9.8Unauthenticated RCE, data exfiltrationNetwork access to EBS; no authentication needed
CVE-2025-61884 Oracle E-Business Suite9.1Unauthenticated data accessNetwork access; often chained with CVE-2025-61882

Broadcom uses Oracle EBS for internal financial operations, making it a prime target in Cl0p’s campaign, which has hit over 29 firms.

The group, linked to FIN11, favors double extortion via data theft before encryption. Immediate actions include patching, monitoring SyncServlet traffic, and segmenting EBS environments.​

Experts urge EBS users to scan logs for suspicious template creation and deploy endpoint detection.

This attack highlights the risks posed by unpatched ERP systems across the manufacturing industry. Oracle’s alerts confirm remote exploitability without user interaction.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Share
Published by
Varshini
Tags: ransomware

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago