PatchSiren cyber security CVE debrief
CVE-2016-8305 Oracle CVE debrief
CVE-2016-8305 is a low-severity information disclosure issue affecting Oracle FLEXCUBE Universal Banking. According to the NVD record, exploitation requires physical access and user interaction by someone other than the attacker, and successful attacks can expose a subset of accessible data. The issue is listed against multiple FLEXCUBE Universal Banking versions and maps to CWE-200.
- Vendor
- Oracle
- Product
- CVE-2016-8305
- CVSS
- LOW 2.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Oracle FLEXCUBE Universal Banking administrators, banking application owners, endpoint and physical security teams, and any organization running one of the affected versions (11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, or 12.2.0).
Technical summary
NVD classifies the issue as CVSS v3.0 2.1 with vector AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N. The vulnerability is described as easily exploitable with physical access and requires human interaction. Impact is limited to unauthorized read access to some accessible data; integrity and availability are not listed as affected in the supplied record. The weakness is categorized as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).
Defensive priority
Low, but not ignorable for environments where attackers could gain physical access to systems used for FLEXCUBE or could influence a local user to interact with malicious content or workflow.
Recommended defensive actions
- Confirm whether any affected Oracle FLEXCUBE Universal Banking versions are deployed in your environment.
- Review Oracle's January 2017 CPU advisory referenced by NVD for vendor remediation guidance.
- Restrict physical access to systems handling FLEXCUBE data and harden workstation/session controls.
- Limit local user interaction paths on endpoints that can reach the application, especially shared or unattended systems.
- Validate that any available Oracle patches or compensating controls have been applied to affected instances.
- Monitor for unauthorized access to sensitive data exposed through local sessions or cached application content.
Evidence notes
All claims above are drawn from the supplied NVD record and its linked references. The record lists the affected versions, CVSS vector, CWE-200, and the requirements for physical access plus user interaction. No KEV entry was provided, and no ransomware association was indicated in the supplied corpus.
Official resources
-
CVE-2016-8305 CVE record
CVE.org
-
CVE-2016-8305 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
Publicly disclosed in the NVD record on 2017-01-27T22:59:01.130Z; the supplied record was last modified on 2026-05-13T00:24:29.033Z.