PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-5590 Oracle CVE debrief

CVE-2016-5590 affects the Monitoring: Agent subcomponent of Oracle MySQL Enterprise Monitor. According to NVD, a high-privileged attacker with network access via TLS could compromise the product, with potential takeover of MySQL Enterprise Monitor. Oracle’s cited advisory and NVD indicate affected supported versions include 3.1.3.7856 and earlier.

Vendor
Oracle
Product
CVE-2016-5590
CVSS
HIGH 7.2
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Oracle MySQL Enterprise Monitor deployments, especially systems running version 3.1.3.7856 or earlier and environments where high-privilege access is possible over network/TLS paths.

Technical summary

NVD describes this as an easily exploitable vulnerability in MySQL Enterprise Monitor’s Monitoring: Agent component. The listed CVSS v3.0 vector is AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, which means exploitation is network-reachable, requires high privileges, and can affect confidentiality, integrity, and availability. NVD’s weakness classification is NVD-CWE-noinfo, so the exact flaw class is not specified in the supplied source corpus. The affected CPE range in NVD ends at version 3.1.3.7856 inclusive.

Defensive priority

High. Prioritize remediation if the agent or monitor is exposed to reachable network paths, if high-privilege credentials are broadly available, or if the affected version range is still deployed. Because the impact includes full product takeover, this should be treated as a significant administrative-security issue even though the privilege requirement is high.

Recommended defensive actions

  • Upgrade Oracle MySQL Enterprise Monitor to a version newer than 3.1.3.7856, following Oracle’s January 2017 CPU guidance.
  • Inventory all MySQL Enterprise Monitor installations and verify whether the Monitoring: Agent component is present and exposed.
  • Restrict network/TLS access to management and agent interfaces to trusted administrative sources only.
  • Review and reduce the number of users or services with high-privilege access to the affected system.
  • Monitor for unusual administrative activity, configuration changes, or service takeover indicators on affected deployments.
  • Use the Oracle advisory and NVD record to validate fixed versions and any vendor-specific mitigation steps before maintenance windows.

Evidence notes

The source corpus supports the affected product, version ceiling, severity, and exploit conditions through the NVD CVE record and NVD detail metadata. NVD lists Oracle MySQL Enterprise Monitor as the affected CPE, with versionEndIncluding 3.1.3.7856, and records the CVSS v3.0 vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. The Oracle January 2017 CPU is referenced by NVD as the vendor advisory, but its content was not retrieved here, so this debrief avoids unsupported patch-specific details beyond the cited version boundary.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-01-27T22:59:00.460Z. The record was last modified on 2026-05-13T00:24:29.033Z. Use the CVE published date for disclosure timing; do not infer a different issue date from later metadata edits.