PatchSiren cyber security CVE debrief
CVE-2017-3902 Mcafee CVE debrief
CVE-2017-3902 is a cross-site scripting (XSS) issue in the Web UI of Intel Security ePO versions 5.1.0 through 5.1.3. According to the NVD record and vendor-linked references, the flaw affects authenticated users and can be triggered by bypassing input validation. The public record assigns CVSS 3.0 5.4 (MEDIUM), reflecting network reachability, low attack complexity, required authentication, and user interaction.
- Vendor
- Mcafee
- Product
- CVE-2017-3902
- CVSS
- MEDIUM 5.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for Intel Security ePO deployments, especially environments running 5.1.0, 5.1.1, 5.1.2, or 5.1.3. Any organization allowing authenticated access to the ePO web interface should treat this as a patching and web-application-input-validation review item.
Technical summary
NVD classifies the weakness as CWE-79 (Cross-Site Scripting) and lists the affected CPEs as McAfee ePolicy Orchestrator 5.1.0 through 5.1.3. The CVSS vector is CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating an authenticated, user-interaction-dependent web UI attack that can impact confidentiality and integrity at low levels but not availability.
Defensive priority
Medium. The flaw requires authentication and user interaction, but it is network-reachable and affects a management web UI, so it should be addressed promptly in environments that expose ePO to multiple admins or broader internal access.
Recommended defensive actions
- Apply the vendor remediation referenced in McAfee Security Bulletin SB10184.
- Verify whether any instance of Intel Security ePO 5.1.0, 5.1.1, 5.1.2, or 5.1.3 is in use.
- Restrict access to the ePO web UI to trusted administrative users and networks only.
- Review and harden input validation and output encoding controls in any custom integrations or extensions that interact with the ePO UI.
- Monitor administrative activity and look for unexpected script injection behavior in the web interface after remediation.
Evidence notes
The source corpus includes the NVD record for CVE-2017-3902, which lists the vulnerability class as CWE-79 and the affected versions as ePO 5.1.0-5.1.3. Vendor-linked references in the NVD record point to McAfee Security Bulletin SB10184, plus SecurityFocus BID 96465 and SecurityTracker 1037628. This debrief uses only those supplied official and source-linked references.
Official resources
-
CVE-2017-3902 CVE record
CVE.org
-
CVE-2017-3902 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
Publicly disclosed on 2017-02-13T16:59:00.203Z. The NVD record was last modified on 2026-05-13T00:24:29.033Z; that modified date is not the vulnerability's issue date.