PatchSiren cyber security CVE debrief
CVE-2017-3264 Oracle CVE debrief
CVE-2017-3264 is a low-severity Oracle Siebel UI Framework issue affecting Siebel CRM Open UI 16.1. NVD describes it as a network-accessible vulnerability that can let a low-privileged attacker cause unauthorized update, insert, or delete actions against some accessible data. The published CVSS v3.0 base score is 3.1, with integrity impact only.
- Vendor
- Oracle
- Product
- CVE-2017-3264
- CVSS
- LOW 3.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-27
- Advisory updated
- 2026-05-13
Who should care
Oracle Siebel CRM administrators, application owners, identity and access management teams, and patch managers responsible for Siebel UI Framework / Open UI 16.1 deployments.
Technical summary
NVD lists oracle:siebel_ui_framework:16.1 as vulnerable and rates the issue CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N. The impact described is integrity-only: a low-privileged network attacker using HTTP could potentially make unauthorized changes to some data exposed by the Siebel UI Framework.
Defensive priority
Low, but prioritize sooner if Siebel UI Framework/Open UI is internet-facing or handles sensitive business data.
Recommended defensive actions
- Confirm whether Siebel UI Framework / Open UI 16.1 is deployed in your environment.
- Apply Oracle's January 2017 Critical Patch Update or the latest supported Oracle security update for the affected Siebel components.
- Restrict network exposure to Siebel UI endpoints and enforce strong authentication and least privilege for application users.
- Review application and database logs for unusual insert, update, or delete activity affecting Siebel-accessible data.
- Validate compensating controls such as segmentation, access control, and change monitoring around the CRM application tier.
Evidence notes
The NVD record for CVE-2017-3264 lists Oracle as the vendor, Siebel UI Framework 16.1 as the affected CPE, and references Oracle's January 2017 CPU advisory as the vendor patch source. The CVSS vector in NVD is AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N, which supports a low-severity integrity-impact assessment. Published date used here is the CVE publication timestamp provided; the 2026-05-13 timestamp is the NVD record modification date, not the vulnerability date.
Official resources
-
CVE-2017-3264 CVE record
CVE.org
-
CVE-2017-3264 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
CVE published on 2017-01-27T22:59:03.053Z. NVD last modified the record on 2026-05-13T00:24:29.033Z. No KEV listing is indicated in the supplied data.