PatchSiren cyber security CVE debrief
CVE-2017-3250 Oracle CVE debrief
CVE-2017-3250 is an Oracle GlassFish Server vulnerability in Oracle Fusion Middleware that affects versions 2.1.1, 3.0.1, and 3.1.2. The public record describes it as easily exploitable over HTTP by an unauthenticated network attacker, with possible unauthorized data read/write access and partial denial of service.
- Vendor
- Oracle
- Product
- CVE-2017-3250
- CVSS
- HIGH 7.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Oracle GlassFish Server or Oracle Fusion Middleware, especially systems exposed to network-accessible HTTP traffic.
Technical summary
NVD rates the issue CVSS 3.0 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and maps it to CWE-200. The record indicates the flaw is reachable over HTTP without authentication and can affect confidentiality, integrity, and availability of data accessible to GlassFish Server.
Defensive priority
High. The issue is network-reachable, requires no authentication, and the published impact includes unauthorized data access, data modification, and partial service denial.
Recommended defensive actions
- Review Oracle’s January 2017 Critical Patch Update advisory for GlassFish Server and apply the vendor’s remediation guidance.
- Inventory any instances running GlassFish Server 2.1.1, 3.0.1, or 3.1.2 and prioritize externally reachable HTTP deployments.
- Restrict network access to affected GlassFish interfaces until remediation is complete, especially admin and application endpoints.
- Check logs and application activity for unauthorized reads, writes, deletes, or service degradation during any exposure window.
Evidence notes
This debrief is based on the CVE record published on 2017-01-27 and the NVD entry, which was last modified on 2026-05-13. The NVD metadata lists affected CPEs, the CVSS vector, CWE-200, and references Oracle’s January 2017 CPU advisory and a SecurityFocus BID entry.
Official resources
-
CVE-2017-3250 CVE record
CVE.org
-
CVE-2017-3250 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
Publicly disclosed in the CVE/NVD record on 2017-01-27; the NVD entry was modified on 2026-05-13. Oracle’s January 2017 CPU advisory is listed as a reference.