PatchSiren cyber security CVE debrief
CVE-2016-5590 Oracle CVE debrief
CVE-2016-5590 affects the Monitoring: Agent subcomponent of Oracle MySQL Enterprise Monitor. According to NVD, a high-privileged attacker with network access via TLS could compromise the product, with potential takeover of MySQL Enterprise Monitor. Oracle’s cited advisory and NVD indicate affected supported versions include 3.1.3.7856 and earlier.
- Vendor
- Oracle
- Product
- CVE-2016-5590
- CVSS
- HIGH 7.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Oracle MySQL Enterprise Monitor deployments, especially systems running version 3.1.3.7856 or earlier and environments where high-privilege access is possible over network/TLS paths.
Technical summary
NVD describes this as an easily exploitable vulnerability in MySQL Enterprise Monitor’s Monitoring: Agent component. The listed CVSS v3.0 vector is AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, which means exploitation is network-reachable, requires high privileges, and can affect confidentiality, integrity, and availability. NVD’s weakness classification is NVD-CWE-noinfo, so the exact flaw class is not specified in the supplied source corpus. The affected CPE range in NVD ends at version 3.1.3.7856 inclusive.
Defensive priority
High. Prioritize remediation if the agent or monitor is exposed to reachable network paths, if high-privilege credentials are broadly available, or if the affected version range is still deployed. Because the impact includes full product takeover, this should be treated as a significant administrative-security issue even though the privilege requirement is high.
Recommended defensive actions
- Upgrade Oracle MySQL Enterprise Monitor to a version newer than 3.1.3.7856, following Oracle’s January 2017 CPU guidance.
- Inventory all MySQL Enterprise Monitor installations and verify whether the Monitoring: Agent component is present and exposed.
- Restrict network/TLS access to management and agent interfaces to trusted administrative sources only.
- Review and reduce the number of users or services with high-privilege access to the affected system.
- Monitor for unusual administrative activity, configuration changes, or service takeover indicators on affected deployments.
- Use the Oracle advisory and NVD record to validate fixed versions and any vendor-specific mitigation steps before maintenance windows.
Evidence notes
The source corpus supports the affected product, version ceiling, severity, and exploit conditions through the NVD CVE record and NVD detail metadata. NVD lists Oracle MySQL Enterprise Monitor as the affected CPE, with versionEndIncluding 3.1.3.7856, and records the CVSS v3.0 vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. The Oracle January 2017 CPU is referenced by NVD as the vendor advisory, but its content was not retrieved here, so this debrief avoids unsupported patch-specific details beyond the cited version boundary.
Official resources
-
CVE-2016-5590 CVE record
CVE.org
-
CVE-2016-5590 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
Publicly disclosed in the CVE/NVD record on 2017-01-27T22:59:00.460Z. The record was last modified on 2026-05-13T00:24:29.033Z. Use the CVE published date for disclosure timing; do not infer a different issue date from later metadata edits.