PatchSiren cyber security CVE debrief
CVE-2017-3828 Cisco CVE debrief
CVE-2017-3828 is a Cisco web-management cross-site scripting issue affecting Unified Communications Manager Switches. According to the official CVE/NVD record, an unauthenticated remote attacker could trigger XSS against a user of the web-based management interface. The NVD record classifies the flaw as CWE-79 and rates it CVSS 3.0 6.1 (Medium). Cisco listed affected releases 11.0(1.10000.10) and 11.5(1.10000.6), with fixed releases identified in the vendor advisory reference.
- Vendor
- Cisco
- Product
- CVE-2017-3828
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Cisco Unified Communications Manager Switches administrators, UC platform security teams, and anyone responsible for the web-based management interface on affected devices. Organizations running the affected releases should treat this as a patching and access-control priority for administrative interfaces.
Technical summary
The official NVD record describes an XSS weakness in the web-based management interface of Cisco Unified Communications Manager Switches. The CVSS 3.0 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network reachability, no privileges required, and a user interaction requirement. NVD maps the issue to CWE-79. The source corpus identifies affected releases 11.0(1.10000.10) and 11.5(1.10000.6), and Cisco-referenced fixed releases include 11.0(1.23063.1), 11.5(1.12029.1), 11.5(1.12900.11), 11.5(1.12900.21), 11.6(1.10000.4), and multiple 12.0 builds.
Defensive priority
Medium
Recommended defensive actions
- Upgrade affected Cisco Unified Communications Manager Switches to a Cisco-fixed release listed in the advisory references.
- Restrict access to the web-based management interface to trusted administrative networks or VPN paths.
- Ensure the management interface is not exposed broadly on untrusted networks, especially internet-facing segments.
- Review administrative workflows and user training for the web UI, since the CVSS vector requires user interaction.
- After remediation, verify the running firmware/software version matches a fixed release and continue monitoring the management interface for abnormal behavior.
Evidence notes
This debrief is based only on the supplied official CVE/NVD corpus and the Cisco advisory reference included there. The NVD record provides the CVSS 3.0 vector, CWE-79 classification, affected versions, and vendor-linked references. The CVE publication date is 2017-02-22; the later NVD modified timestamp of 2026-05-13 reflects record maintenance, not the original disclosure date.
Official resources
-
CVE-2017-3828 CVE record
CVE.org
-
CVE-2017-3828 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE published on 2017-02-22 in the official CVE/NVD record. The supplied NVD source item was last modified on 2026-05-13, which indicates database maintenance rather than a new vulnerability disclosure date.