PatchSiren cyber security CVE debrief
CVE-2017-3833 Cisco CVE debrief
CVE-2017-3833 is a medium-severity cross-site scripting vulnerability in the web framework of Cisco Unified Communications Manager. Cisco and NVD describe it as allowing an unauthenticated, remote attacker to conduct an XSS attack against a user of the affected web interface. The supplied record lists one known affected release, 12.0(0.99999.2), and multiple fixed releases across 11.0, 11.5, 11.6, and 12.0 builds.
- Vendor
- Cisco
- Product
- CVE-2017-3833
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Cisco Unified Communications Manager administrators, identity and collaboration platform teams, web application security teams, and organizations exposing the CUCM web interface to users should prioritize this issue.
Technical summary
The vulnerability is classified as CWE-79 (cross-site scripting). NVD summarizes the attack vector as network-based with low attack complexity, no privileges required, and user interaction required, with changed scope and low confidentiality/integrity impact. In practical terms, a remote unauthenticated attacker can trigger script execution in a user's browser through the CUCM web interface, which can affect the user session or trust boundary of the web application.
Defensive priority
Medium. The issue is externally reachable and unauthenticated, but it requires user interaction and is rated CVSS 6.1. It should be remediated promptly on any exposed or actively used Cisco Unified Communications Manager deployment.
Recommended defensive actions
- Upgrade Cisco Unified Communications Manager to a fixed release listed in the record.
- Confirm whether any deployment is running the known affected release 12.0(0.99999.2) or another vulnerable build covered by Cisco's fixed-release matrix.
- Review and harden access to the CUCM web interface, especially for administrative or broadly used user-facing pages.
- Apply web security controls that reduce XSS impact, including output encoding and content-security controls where supported by the product.
- Validate browser-session and authentication protections for users who access the CUCM web interface.
- Track Cisco security advisories and replace any interim workaround with a vendor-fixed release as soon as possible.
Evidence notes
The vulnerability description, CVSS score/severity, published date, and fixed/affected release information come from the supplied CVE record. NVD metadata identifies CWE-79 and the CVSS v3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The supplied enrichment data indicates this CVE is not on CISA KEV and has no ransomware-campaign flag in the provided corpus.
Official resources
-
CVE-2017-3833 CVE record
CVE.org
-
CVE-2017-3833 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the supplied record on 2017-02-22. The supplied NVD record was modified on 2026-05-13. No KEV entry is present in the provided data.