PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3314 Oracle CVE debrief

CVE-2017-3314 is a medium-severity Oracle FLEXCUBE Universal Banking issue affecting supported versions 12.0.0, 12.1.0, and 12.2.0. Oracle and NVD describe it as remotely reachable over HTTP by an unauthenticated attacker, but with a user interaction requirement. Successful exploitation can lead to unauthorized read access and unauthorized update/insert/delete access to some accessible data, which makes it especially important for banking environments handling sensitive records.

Vendor
Oracle
Product
CVE-2017-3314
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Oracle FLEXCUBE Universal Banking administrators, application owners, banking security teams, and incident response teams responsible for customer-data integrity and confidentiality.

Technical summary

NVD lists the issue with CVSS v3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network access, low attack complexity, no privileges required, and a user-interaction dependency. The affected CPEs in NVD are Oracle FLEXCUBE Universal Banking 12.0.0, 12.1.0, and 12.2.0. The reported impact is limited confidentiality and integrity exposure rather than availability loss. The NVD record cites Oracle’s January 2017 CPU advisory as the vendor reference.

Defensive priority

Medium. Prioritize remediation if the application is internet-facing or used in high-value banking workflows, because the issue is unauthenticated over HTTP and can affect data integrity.

Recommended defensive actions

  • Verify whether Oracle FLEXCUBE Universal Banking 12.0.0, 12.1.0, or 12.2.0 is deployed in your environment.
  • Apply Oracle’s January 2017 CPU remediation guidance referenced in the vendor advisory.
  • Reduce or tightly control network exposure to the application, especially HTTP access from untrusted networks.
  • Review application access paths that rely on user interaction and harden user-facing workflows where possible.
  • Monitor for unexpected data changes or unauthorized reads affecting FLEXCUBE-accessible records.
  • Update internal vulnerability records and confirm compensating controls if patching is delayed.

Evidence notes

This debrief is based only on the supplied NVD record and its cited references. The CVE published date is 2017-01-27T22:59:04.413Z. NVD provides the affected versions, CVSS vector, and impact statement. Oracle’s CPU January 2017 advisory is cited in the NVD references as the vendor advisory, with SecurityFocus and SecurityTracker listed as additional corroborating references.

Official resources

Publicly disclosed in NVD on 2017-01-27; Oracle’s January 2017 CPU advisory is referenced by NVD as the vendor remediation source.