PatchSiren cyber security CVE debrief
CVE-2016-9993 IBM CVE debrief
CVE-2016-9993 is a SQL injection vulnerability in IBM Kenexa LCMS Premier on Cloud. According to NVD, affected versions include 9.0 through 10.2, and the issue is rated CVSS 3.0 7.1 (High). A remote attacker with low privileges could send crafted SQL statements and potentially read, add, modify, or delete backend database information.
- Vendor
- IBM
- Product
- CVE-2016-9993
- CVSS
- HIGH 7.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-03-01
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-03-01
- Advisory updated
- 2026-05-13
Who should care
IBM Kenexa LCMS Premier administrators, application owners, and security teams responsible for versions 9.0 through 10.2, especially where the application is reachable by untrusted users or networks.
Technical summary
NVD classifies this issue as CWE-89 (SQL Injection) and lists the vector CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N. The published description says an attacker could use specially crafted SQL statements to interact with the backend database. NVD CPE entries mark IBM Kenexa LCMS Premier versions 9.0, 9.1, 9.2, 9.2.1, 9.3, 9.4, 9.5, 10.0, 10.1, and 10.2 as vulnerable. The NVD record links to IBM reference 1992067 as the vendor advisory/patch reference.
Defensive priority
High for exposed IBM Kenexa LCMS Premier deployments. The confidentiality impact is high and the attack can be network-delivered with only low privileges, so remediation should be prioritized for any affected instance still in service.
Recommended defensive actions
- Confirm whether IBM Kenexa LCMS Premier versions 9.0 through 10.2 are deployed anywhere in your environment.
- Review IBM advisory/reference 1992067 and apply the vendor-supplied patch or mitigation guidance if not already done.
- Restrict access to the application and limit which users can reach database-backed functionality until remediation is complete.
- Audit application and database logs for anomalous SQL activity or unexpected data access around the affected components.
- After remediation, validate that the vulnerable versions are no longer reachable and document the fixed state in asset inventory.
Evidence notes
All claims are based on the supplied CVE/NVD corpus and the IBM vendor reference linked from NVD. The CVSS vector, CWE mapping, and vulnerable version list come from the NVD record. No exploit code, reproduction steps, or unsupported remediation claims were added.
Official resources
-
CVE-2016-9993 CVE record
CVE.org
-
CVE-2016-9993 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
Published on 2017-03-01; last modified in the supplied NVD record on 2026-05-13. No CISA KEV entry was supplied.