PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3420 Oracle CVE debrief

CVE-2017-3420 is a high-severity vulnerability in Oracle CRM Technical Foundation, a component of Oracle E-Business Suite, affecting version 12.1.3. NVD describes it as easily exploitable over HTTP by an unauthenticated attacker, but successful exploitation requires human interaction from someone other than the attacker. Oracle and NVD rate the issue as materially affecting confidentiality and integrity, with CVSS v3.0 8.2.

Vendor
Oracle
Product
CVE-2017-3420
CVSS
HIGH 8.2
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-27
Original CVE updated
2026-05-13
Advisory published
2017-01-27
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Oracle E-Business Suite deployments, especially environments using Oracle CRM Technical Foundation 12.1.3. Teams that expose the affected UI over HTTP should treat this as a priority remediation item.

Technical summary

The published record says the issue is in Oracle CRM Technical Foundation subcomponent User Interface and is reachable over the network via HTTP without authentication. The CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N) indicates no privileges are needed, but a user must interact with the vulnerable flow for exploitation to succeed. NVD lists the affected CPE as Oracle Customer Relationship Management Technical Foundation 12.1.3. The record does not provide a CWE classification beyond NVD-CWE-noinfo.

Defensive priority

High. Even though user interaction is required, the attack surface is network-reachable and unauthenticated, and the impact includes unauthorized access to critical data and some update/insert/delete capability.

Recommended defensive actions

  • Identify Oracle E-Business Suite instances running Oracle CRM Technical Foundation 12.1.3.
  • Review Oracle's January 2017 CPU advisory for the vendor-recommended remediation path and apply the relevant patch or update where applicable.
  • Limit exposure of affected HTTP/UI endpoints to trusted networks until remediation is complete.
  • Monitor for unusual access patterns involving the Oracle CRM Technical Foundation user interface and associated data access.
  • Validate that compensating controls do not rely on user behavior alone, since exploitation depends on human interaction.

Evidence notes

All claims above are drawn from the supplied NVD record and its referenced Oracle CPU January 2017 advisory. The record explicitly states the affected product/version, attack vector, requirement for human interaction, and confidentiality/integrity impacts. No exploit details or unsupported remediation specifics are included.

Official resources

Publicly disclosed in the CVE/NVD record on 2017-01-27T22:59:07.600Z, with the NVD entry later modified on 2026-05-13T00:24:29.033Z.