PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-3821 Cisco CVE debrief

CVE-2017-3821 is a reflected cross-site scripting flaw in the serviceability page of Cisco Unified Communications Manager. Cisco’s advisory is referenced by NVD, and the vulnerability is described as remotely reachable by an unauthenticated attacker. Because successful XSS can run in a user’s browser with the privileges of the viewing session, administrators should treat exposed management interfaces as sensitive until patched.

Vendor
Cisco
Product
CVE-2017-3821
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-22
Original CVE updated
2026-05-13
Advisory published
2017-02-22
Advisory updated
2026-05-13

Who should care

Cisco Unified Communications Manager administrators, voice/telephony platform owners, and security teams responsible for management-plane exposure and web application hardening.

Technical summary

NVD maps this issue to CWE-79 and a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network reachability, no privileges required, and user interaction needed. The supplied corpus identifies Cisco Unified Communications Manager 10.5(2.14076.1) as affected and lists fixed releases 12.0(0.98000.209), 12.0(0.98000.478), and 12.0(0.98000.609). The flaw is specifically described as a reflected XSS issue in the serviceability page.

Defensive priority

Medium; raise to high priority if the CUCM serviceability page is accessible beyond tightly controlled admin networks or if untrusted users can reach the interface.

Recommended defensive actions

  • Upgrade Cisco Unified Communications Manager to a listed fixed release: 12.0(0.98000.209), 12.0(0.98000.478), or 12.0(0.98000.609).
  • Restrict access to the serviceability page and related management interfaces to trusted administrative networks only.
  • Verify deployed CUCM versions against the affected release explicitly named in the supplied record, 10.5(2.14076.1).
  • Review browser-facing admin workflows for reflected input handling and remove unnecessary exposure of the serviceability interface.
  • Monitor administrative sessions for unexpected page content, redirects, or script-injection indicators consistent with XSS abuse.

Evidence notes

The source corpus is the NVD CVE record for CVE-2017-3821, published on 2017-02-22 and modified on 2026-05-13. NVD cites Cisco PSIRT references and classifies the weakness as CWE-79 with CVSS vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The description in the supplied record states that an unauthenticated remote attacker could conduct reflected XSS attacks against the serviceability page. The record also names one affected release and three fixed releases. No KEV listing or ransomware association is present in the supplied data.

Official resources

Publicly disclosed on 2017-02-22; the supplied NVD record was last modified on 2026-05-13.