PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3795 Cisco CVE debrief

CVE-2017-3795 affects Cisco WebEx Meetings Server 2.6. Cisco describes it as allowing an authenticated, remote attacker to perform arbitrary password changes against any non-administrative user. NVD assigns CVSS 3.0 5.4 (MEDIUM) and maps the issue to CWE-287. Cisco lists 2.7.1.12 as the known fixed release.

Vendor
Cisco
Product
CVE-2017-3795
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-26
Original CVE updated
2026-05-13
Advisory published
2017-01-26
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for Cisco WebEx Meetings Server deployments, especially any environment running version 2.6, should treat this as a credential-integrity issue affecting non-administrative user accounts.

Technical summary

The vulnerability is reachable remotely by an authenticated attacker and affects Cisco WebEx Meetings Server 2.6. According to the NVD record, the attack requires low privileges and no user interaction, with integrity impact on user passwords and no confidentiality or availability impact scored in the supplied CVSS vector. The issue is documented by Cisco and NVD with a fixed release of 2.7.1.12.

Defensive priority

Medium priority. The CVSS score is moderate, but the impact to account integrity makes remediation important for any exposed or actively used Cisco WebEx Meetings Server 2.6 instance.

Recommended defensive actions

  • Upgrade Cisco WebEx Meetings Server to the fixed release 2.7.1.12.
  • Confirm whether any Cisco WebEx Meetings Server 2.6 instances are still deployed and plan remediation accordingly.
  • Review account and password-change activity for non-administrative users to look for unauthorized changes.
  • Limit authenticated access to the platform to trusted administrative users and networks where possible while remediation is underway.

Evidence notes

The supplied NVD record identifies Cisco WebEx Meetings Server 2.6 as vulnerable via CPE criteria and lists Cisco Security Advisory cisco-sa-20170118-wms1 as the vendor advisory reference. The NVD CVSS vector is CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, and the mapped weakness is CWE-287. The provided data also names 2.7.1.12 as the known fixed release. No KEV entry is present in the supplied corpus.

Official resources

CVE-2017-3795 was published on 2017-01-26. The supplied NVD record references a Cisco vendor advisory for product-specific mitigation guidance.