PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3264 Oracle CVE debrief

CVE-2017-3264 is a low-severity Oracle Siebel UI Framework issue affecting Siebel CRM Open UI 16.1. NVD describes it as a network-accessible vulnerability that can let a low-privileged attacker cause unauthorized update, insert, or delete actions against some accessible data. The published CVSS v3.0 base score is 3.1, with integrity impact only.

Vendor
Oracle
Product
CVE-2017-3264
CVSS
LOW 3.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Oracle Siebel CRM administrators, application owners, identity and access management teams, and patch managers responsible for Siebel UI Framework / Open UI 16.1 deployments.

Technical summary

NVD lists oracle:siebel_ui_framework:16.1 as vulnerable and rates the issue CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N. The impact described is integrity-only: a low-privileged network attacker using HTTP could potentially make unauthorized changes to some data exposed by the Siebel UI Framework.

Defensive priority

Low, but prioritize sooner if Siebel UI Framework/Open UI is internet-facing or handles sensitive business data.

Recommended defensive actions

  • Confirm whether Siebel UI Framework / Open UI 16.1 is deployed in your environment.
  • Apply Oracle's January 2017 Critical Patch Update or the latest supported Oracle security update for the affected Siebel components.
  • Restrict network exposure to Siebel UI endpoints and enforce strong authentication and least privilege for application users.
  • Review application and database logs for unusual insert, update, or delete activity affecting Siebel-accessible data.
  • Validate compensating controls such as segmentation, access control, and change monitoring around the CRM application tier.

Evidence notes

The NVD record for CVE-2017-3264 lists Oracle as the vendor, Siebel UI Framework 16.1 as the affected CPE, and references Oracle's January 2017 CPU advisory as the vendor patch source. The CVSS vector in NVD is AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N, which supports a low-severity integrity-impact assessment. Published date used here is the CVE publication timestamp provided; the 2026-05-13 timestamp is the NVD record modification date, not the vulnerability date.

Official resources

CVE published on 2017-01-27T22:59:03.053Z. NVD last modified the record on 2026-05-13T00:24:29.033Z. No KEV listing is indicated in the supplied data.