PatchSiren cyber security CVE debrief
CVE-2017-3795 Cisco CVE debrief
CVE-2017-3795 affects Cisco WebEx Meetings Server 2.6. Cisco describes it as allowing an authenticated, remote attacker to perform arbitrary password changes against any non-administrative user. NVD assigns CVSS 3.0 5.4 (MEDIUM) and maps the issue to CWE-287. Cisco lists 2.7.1.12 as the known fixed release.
- Vendor
- Cisco
- Product
- CVE-2017-3795
- CVSS
- MEDIUM 5.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-26
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-26
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Cisco WebEx Meetings Server deployments, especially any environment running version 2.6, should treat this as a credential-integrity issue affecting non-administrative user accounts.
Technical summary
The vulnerability is reachable remotely by an authenticated attacker and affects Cisco WebEx Meetings Server 2.6. According to the NVD record, the attack requires low privileges and no user interaction, with integrity impact on user passwords and no confidentiality or availability impact scored in the supplied CVSS vector. The issue is documented by Cisco and NVD with a fixed release of 2.7.1.12.
Defensive priority
Medium priority. The CVSS score is moderate, but the impact to account integrity makes remediation important for any exposed or actively used Cisco WebEx Meetings Server 2.6 instance.
Recommended defensive actions
- Upgrade Cisco WebEx Meetings Server to the fixed release 2.7.1.12.
- Confirm whether any Cisco WebEx Meetings Server 2.6 instances are still deployed and plan remediation accordingly.
- Review account and password-change activity for non-administrative users to look for unauthorized changes.
- Limit authenticated access to the platform to trusted administrative users and networks where possible while remediation is underway.
Evidence notes
The supplied NVD record identifies Cisco WebEx Meetings Server 2.6 as vulnerable via CPE criteria and lists Cisco Security Advisory cisco-sa-20170118-wms1 as the vendor advisory reference. The NVD CVSS vector is CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, and the mapped weakness is CWE-287. The provided data also names 2.7.1.12 as the known fixed release. No KEV entry is present in the supplied corpus.
Official resources
-
CVE-2017-3795 CVE record
CVE.org
-
CVE-2017-3795 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE-2017-3795 was published on 2017-01-26. The supplied NVD record references a Cisco vendor advisory for product-specific mitigation guidance.