PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-9053 Aerospike CVE debrief

CVE-2016-9053 describes a critical memory-safety issue in Aerospike Database Server 3.10.0.3. A specially crafted network packet can trigger out-of-bounds indexing in the RW fabric message particle type, causing the server to fetch a function table outside an array boundary. NVD rates the issue CVSS 3.1 9.8, reflecting the potential for unauthenticated remote code execution over the network.

Vendor
Aerospike
Product
CVE-2016-9053
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-21
Original CVE updated
2026-05-13
Advisory published
2017-02-21
Advisory updated
2026-05-13

Who should care

Organizations running Aerospike Database Server 3.10.0.3, especially teams exposing the database service to untrusted networks or operating internet-reachable instances. Security, platform, and database administrators should prioritize it because exploitation does not require privileges or user interaction.

Technical summary

The NVD record identifies the issue as CWE-129 (improper validation of array index) affecting Aerospike Database Server 3.10.0.3. The vulnerable path is the RW fabric message particle type, where a crafted packet can drive an out-of-bounds array access when selecting a function table. The reported impact is remote code execution via network access. The supplied corpus does not include a fixed version number, but it does point to a Talos advisory tagged as Patch and Technical Description.

Defensive priority

Critical. The combination of network reachability, no authentication, no user interaction, and high confidentiality/integrity/availability impact makes this a high-priority remediation item for exposed Aerospike deployments.

Recommended defensive actions

  • Confirm whether any Aerospike Database Server instances are running version 3.10.0.3.
  • Restrict network access to the Aerospike service so only trusted hosts can connect.
  • Apply the vendor-supplied fix or upgrade path described in the linked advisory and vendor/CVE references.
  • Review exposed instances for unexpected connection attempts or abnormal service behavior.
  • Track this CVE in vulnerability management and incident response workflows until affected systems are remediated.

Evidence notes

This debrief is based only on the supplied NVD CVE record and its references. Supported facts include the affected version (3.10.0.3), the network-triggered out-of-bounds indexing condition, the RCE impact, the CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and CWE-129. The corpus does not provide a verified fixed version or detailed patch steps, so remediation guidance is intentionally generic and limited to the referenced advisory context.

Official resources

CVE published 2017-02-21 and last modified 2026-05-13 in the supplied NVD record. The provided enrichment indicates it is not a KEV-listed vulnerability. Do not treat the 2026 modification date as the issue date.