PatchSiren cyber security CVE debrief
CVE-2017-3838 Cisco CVE debrief
CVE-2017-3838 is a medium-severity DOM-based cross-site scripting flaw in Cisco Secure Access Control System (ACS). According to the CVE/NVD record, an unauthenticated remote attacker could trigger XSS in the web interface and affect a user of the system. The record lists Cisco Secure Access Control System 5.8(2.5) as the known affected release and classifies the weakness as CWE-79.
- Vendor
- Cisco
- Product
- CVE-2017-3838
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Cisco Secure Access Control System deployments, especially systems running the affected 5.8(2.5) release and any environment where users access the ACS web interface.
Technical summary
The vulnerability is a DOM-based XSS issue in the ACS web interface. NVD lists the attack vector as network reachable, with no authentication required, but with user interaction required and a changed scope. The recorded CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that successful abuse could expose or alter browser-side content for the interacting user.
Defensive priority
Medium. The issue is remotely reachable and requires no attacker authentication, but it does require user interaction and the recorded impact is limited to low confidentiality and integrity effects. Prioritize remediation if the ACS web interface is exposed to users or administrators.
Recommended defensive actions
- Confirm whether Cisco Secure Access Control System 5.8(2.5) is deployed anywhere in your environment.
- Follow Cisco's vendor advisory guidance for remediation and update to a non-affected release if available.
- Restrict access to the ACS web interface to trusted administrative networks only.
- Treat unexpected links, crafted URLs, and unusual web interface behavior as potential XSS indicators.
- Review browser-side protections and security controls used by administrators accessing the ACS interface.
Evidence notes
This debrief is based only on the supplied CVE/NVD corpus and referenced Cisco advisory links. The record states: unauthenticated remote attacker, DOM-based XSS, affected release 5.8(2.5), and CWE-79. Published date used here is the CVE/NVD published timestamp of 2017-02-22T02:59:00.480Z. The modified timestamp is record-maintenance context only and is not treated as the issue date.
Official resources
-
CVE-2017-3838 CVE record
CVE.org
-
CVE-2017-3838 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the CVE/NVD record on 2017-02-22, with Cisco vendor advisory references included in the record.