PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8325 Oracle CVE debrief

CVE-2016-8325 is a critical Oracle E-Business Suite vulnerability in the One-to-One Fulfillment component (Internal Operations). Oracle and NVD describe it as easily exploitable over HTTP by an unauthenticated network attacker, with potential for unauthorized creation, deletion, or modification of critical data, or unauthorized access to all accessible One-to-One Fulfillment data. NVD rates it CVSS 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

Vendor
Oracle
Product
CVE-2016-8325
CVSS
CRITICAL 9.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Oracle E-Business Suite administrators, application security teams, and asset owners running Oracle One-to-One Fulfillment 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, or 12.2.6, especially where the service is network-reachable.

Technical summary

NVD lists the weakness as CWE-284 and marks the affected Oracle One-to-One Fulfillment versions as vulnerable. The published CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, indicating a network-attackable issue requiring no privileges or user interaction, with high confidentiality and integrity impact and no availability impact.

Defensive priority

Urgent. Treat as a high-priority patching and exposure-reduction issue for any affected Oracle E-Business Suite deployment.

Recommended defensive actions

  • Apply the Oracle security update referenced in the January 2017 Oracle Critical Patch Update advisory or a later fixed release.
  • Inventory Oracle E-Business Suite environments to confirm whether One-to-One Fulfillment versions 12.1.1 through 12.2.6 are present.
  • Restrict network access to the affected application components and limit HTTP exposure to trusted administrative paths and networks.
  • Review logs and change records for unauthorized data creation, deletion, or modification in One-to-One Fulfillment.
  • Validate compensating controls and ensure patch management coverage for all affected instances, including test and standby systems.

Evidence notes

This debrief is based on the supplied NVD record and its referenced Oracle advisory links. The source corpus identifies the affected versions, CVSS 3.0 score/vector, and the Oracle January 2017 CPU reference. No exploit code or unverified impact claims are included.

Official resources

Publicly disclosed; CVE published by NVD on 2017-01-27. This summary uses the supplied publication date and official vulnerability sources only.