Thursday, April 17, 2025
HomeCVE/vulnerabilityCISA Alerts: Oracle Agile Vulnerability Actively Exploited

CISA Alerts: Oracle Agile Vulnerability Actively Exploited

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding active exploitation of a severe deserialization vulnerability (CVE-2024-20953) in Oracle Agile Product Lifecycle Management (PLM) software.

Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on February 24, 2025, the flaw allows attackers with low-privileged access to execute arbitrary code on unpatched systems, potentially leading to full network compromise.

Federal agencies and private sector organizations have until March 17, 2025, to implement mitigations or discontinue the use of affected systems.

- Advertisement - Google News

Oracle Agile Vulnerability

At the heart of this emergency is CWE-502, a critical deserialization vulnerability that enables attackers to manipulate serialized objects in the Java-based Oracle Agile PLM platform.

Security analysts at Horizon3.ai explain that successful exploitation bypasses standard authentication checks, granting attackers “the ability to execute commands under the identity of the Oracle WebLogic server”.

This access level could enable data theft, lateral movement across corporate networks, and disruption of manufacturing supply chains dependent on PLM systems.

While CISA’s advisory doesn’t confirm ransomware group involvement, the timing coincides with increased cybercriminal focus on operational technology.

Industrial security firm Claroty reports a 78% year-over-year increase in attacks targeting product lifecycle management systems, suggesting threat actors may be leveraging CVE-2024-20953 for intellectual property theft or production sabotage.

Technical Breakdown and Enterprise Impact

Oracle’s out-of-cycle patch, released in January 2025, modifies how the Agile PLM platform processes serialized data through its FileNet connector.

However, many organizations have delayed updates due to the platform’s integration with critical ERP and CAD systems.

Cybersecurity consultant Aaron Sandeen warns, “This vulnerability is particularly dangerous because it can be triggered through normal HTTP requests, making detection challenging without specialized tooling”.

Analysis of network traffic from compromised systems reveals attackers using crafted .JSON files to exploit the Java deserialization flaw.

Subsequent payloads observed in the wild include cryptocurrency miners, Cobalt Strike beacons, and custom malware designed to scrape product blueprints.

The U.S. Defense Industrial Base (DIB) has reported multiple incidents where attackers accessed technical data packages for advanced weapon systems.

Oracle recommends the immediate application of Security Alert 26547894 and the disabling of unnecessary FileNet services.

For organizations unable to patch swiftly, network segmentation solutions from vendors like Illumio and Guardicore can isolate PLM instances while allowing controlled CAD file transfers.

CISA emphasizes that virtual patching through web application firewalls (WAFs) with updated rules from Trend Micro and Fortinet provides temporary protection.

The agency’s free vulnerability scanning service now includes dedicated checks for CVE-2024-20953 configurations.

With Oracle Agile PLM used by 89% of Fortune 500 manufacturers, the vulnerability’s reach extends across the aerospace, automotive, and electronics sectors.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...