PatchSiren cyber security CVE debrief
CVE-2017-3845 Cisco CVE debrief
Cisco Prime Collaboration Assurance contains a cross-site scripting (XSS) flaw in its web-based management interface. An unauthenticated remote attacker could trigger the issue against a user of the interface. Cisco lists versions 11.0, 11.1, and 11.5 as affected; versions prior to 11.0 are not vulnerable.
- Vendor
- Cisco
- Product
- CVE-2017-3845
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Cisco Prime Collaboration Assurance, especially environments where the web-based management interface is reachable by trusted users or broader networks.
Technical summary
NVD describes CVE-2017-3845 as a network-reachable XSS issue with no authentication required and user interaction required (CVSS v3.0: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). The weakness is mapped to CWE-79. The affected Cisco Prime Collaboration Assurance versions listed in the supplied data are 11.0.0, 11.1.0, and 11.5.0.
Defensive priority
Moderate; prioritize faster remediation if the management UI is widely accessible, used by privileged operators, or exposed outside a tightly controlled admin network.
Recommended defensive actions
- Upgrade Cisco Prime Collaboration Assurance to a non-vulnerable release identified by Cisco.
- Restrict access to the web-based management interface to trusted administrative networks only.
- Review administrative sessions and browser usage paths where injected content could be rendered to users.
- Apply least-privilege access and monitor for unexpected script/content injection in the management UI.
- Use the Cisco advisory and NVD entry to confirm the vendor’s remediation guidance for your deployment.
Evidence notes
The supplied NVD record states the vulnerability is in Cisco Prime Collaboration Assurance and maps it to CWE-79 with CVSS v3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The record also lists affected CPE versions 11.0.0, 11.1.0, and 11.5.0, and notes that versions prior to 11.0 are not vulnerable. Cisco’s advisory is cited in the NVD references.
Official resources
-
CVE-2017-3845 CVE record
CVE.org
-
CVE-2017-3845 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in 2017-02-22; the supplied data does not include a Known Exploited Vulnerabilities (KEV) listing.