PatchSiren cyber security CVE debrief
CVE-2016-3046 IBM CVE debrief
CVE-2016-3046 is a SQL injection vulnerability in IBM Security Access Manager products. NVD links the issue to IBM Security Access Manager for Web 8.0 firmware, IBM Security Access Manager for Mobile, and IBM Security Access Manager 9.0 firmware. The NVD CVSS v3.0 vector shows network access, low complexity, high privileges required, no user interaction, and limited confidentiality impact.
- Vendor
- IBM
- Product
- CVE-2016-3046
- CVSS
- LOW 2.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-01
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-01
- Advisory updated
- 2026-05-13
Who should care
IBM Security Access Manager administrators, IAM/security operations teams, and application owners running the affected IBM Web, Mobile, or 9.0 firmware components should review exposure and confirm vendor guidance was applied.
Technical summary
The issue is classified as CWE-89 (SQL injection). According to the NVD record, a remote attacker could send specially crafted SQL statements to view information in the back-end database. The CVSS v3.0 vector is AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N, which indicates remote network reachability but also a high privilege requirement and only limited confidentiality impact.
Defensive priority
Medium. The published CVSS score is low (2.7), but the vulnerability affects identity and access management components and can expose back-end database information if an attacker has the required privileges.
Recommended defensive actions
- Confirm whether IBM Security Access Manager for Web 8.0 firmware, Security Access Manager for Mobile, or Security Access Manager 9.0 firmware is deployed in your environment.
- Review IBM’s vendor advisory and apply the referenced patch or remediation guidance from the IBM support document.
- Restrict and monitor privileged access to the affected components, since the NVD vector requires high privileges.
- Check logs and database access patterns for unusual queries or unexpected data exposure tied to the affected IBM components.
- If the affected product is no longer needed, plan upgrade, replacement, or decommissioning to reduce long-term exposure.
Evidence notes
This debrief is based on the official NVD CVE record and the IBM-linked vendor advisory referenced by NVD. The published date in the source is 2017-02-01T20:59:00.847Z, and the record was last modified on 2026-05-13T00:24:29.033Z. NVD lists CWE-89 and the CVSS v3.0 vector AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N. The NVD record references IBM support documentation as the patch/vendor advisory source.
Official resources
-
CVE-2016-3046 CVE record
CVE.org
-
CVE-2016-3046 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
CVE published by the CVE/NVD ecosystem on 2017-02-01 and last modified on 2026-05-13. The NVD record points to IBM support documentation for patching guidance.