PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3283 Oracle CVE debrief

CVE-2017-3283 is an Oracle Partner Management vulnerability in Oracle E-Business Suite’s user interface layer. Oracle’s NVD record describes it as network-reachable over HTTP, unauthenticated, and requiring human interaction. Successful attacks can lead to unauthorized update, insert, or delete access to some Partner Management data, with integrity impact emphasized in the CVSS v3.0 score of 4.7.

Vendor
Oracle
Product
CVE-2017-3283
CVSS
MEDIUM 4.7
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Oracle E-Business Suite administrators, Oracle Partner Management owners, application security teams, and patch management teams responsible for supported 12.1.1/12.1.2/12.1.3/12.2.3/12.2.4/12.2.5/12.2.6 deployments.

Technical summary

NVD lists the weakness as CWE-20 (Improper Input Validation) and scores it CVSS v3.0 4.7 with vector AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. The affected CPEs cover Oracle Partner Management versions 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, and 12.2.6. The issue is exploitable over the network and does not require privileges, but it does require user interaction.

Defensive priority

Medium. The issue is network-reachable and unauthenticated, but it requires user interaction and the published impact is limited to integrity effects in the supplied CVSS record.

Recommended defensive actions

  • Review Oracle Critical Patch Update guidance for January 2017 and confirm the corresponding fix has been applied to every affected Oracle Partner Management instance.
  • Inventory Oracle E-Business Suite deployments and verify whether any supported affected versions (12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6) are in use.
  • Restrict exposure of Oracle Partner Management UI endpoints to trusted networks where possible.
  • Validate that application and change-control monitoring can detect unauthorized updates, inserts, or deletions in Partner Management data.
  • Use Oracle and NVD records as the authoritative references when confirming remediation status and version applicability.

Evidence notes

Source evidence comes from the supplied NVD record and its references. NVD describes the vulnerability as affecting Oracle Partner Management in Oracle E-Business Suite, with CVSS v3.0 4.7 (AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N) and CWE-20. The record lists the affected supported versions and points to Oracle’s January 2017 CPU advisory plus SecurityFocus BID 95587 and SecurityTracker 1037639 as references.

Official resources

CVE published 2017-01-27T22:59:03.693Z; source/NVD modified 2026-05-13T00:24:29.033Z. No KEV entry was supplied for this CVE.