PatchSiren cyber security CVE debrief
CVE-2016-3408 Synacor CVE debrief
CVE-2016-3408 is a cross-site scripting (XSS) vulnerability in Zimbra Collaboration before 8.7.0. The published record says remote attackers could inject arbitrary web script or HTML via unspecified vectors, and NVD maps the issue to CWE-79 with a CVSS 3.0 score of 6.1 (network exploitable, no privileges required, but user interaction is needed). The affected-version data in NVD marks Zimbra Collaboration Suite versions up to 8.6.0 as vulnerable, with 8.7.0 identified in the supplied vendor references as the relevant release boundary.
- Vendor
- Synacor
- Product
- CVE-2016-3408
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-18
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-18
- Advisory updated
- 2026-05-13
Who should care
Zimbra Collaboration administrators, especially teams running version 8.6.0 or earlier and any internet-facing webmail deployments.
Technical summary
The vulnerability is a web-based XSS condition in Zimbra Collaboration (CWE-79). NVD lists the affected CPE range as Zimbra Collaboration Suite versions through 8.6.0, and the CVSS vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates a remotely reachable issue that does not require authentication but does require user interaction. The source corpus does not provide a more specific injection path, so the exact affected workflow should be validated against the vendor advisory and release notes linked in the record.
Defensive priority
Medium priority. Patch promptly if Zimbra is exposed to end users or external traffic, because XSS can affect browser sessions and content integrity even when the attack path is user-driven. The most direct risk reduction is upgrading to the fixed release and hardening any custom web content handling.
Recommended defensive actions
- Upgrade Zimbra Collaboration to 8.7.0 or later, since the supplied references identify 8.7.0 as the relevant fixed-release boundary and NVD marks 8.6.0 and earlier as vulnerable.
- Review Zimbra-facing web content paths for unsafe HTML rendering and ensure user-controlled input is encoded or sanitized before display.
- Validate any custom themes, templates, extensions, or integrations that render mail or web UI content, because XSS often appears in application-specific presentation layers.
- Harden administrator and user browser sessions with security controls such as content filtering and restrictive browser policies to reduce the impact of script injection.
- Monitor for unusual client-side behavior or reports of unexpected script execution in Zimbra pages, and treat those as indicators to investigate affected content or accounts.
Evidence notes
Primary evidence comes from the supplied NVD record and CVE metadata: the description names XSS in Zimbra Collaboration before 8.7.0, and the NVD entry assigns CVSS 3.0 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N with CWE-79. The NVD CPE criteria in the supplied source mark Zimbra Collaboration Suite through version 8.6.0 as vulnerable. The record also includes official vendor links to Zimbra 8.7.0 release notes and the Zimbra security advisories page. The CVE was published in the supplied record on 2017-01-18 and last modified on 2026-05-13; those dates are publication metadata, not the exploitation date.
Official resources
-
CVE-2016-3408 CVE record
CVE.org
-
CVE-2016-3408 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Release Notes
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Published in the supplied record on 2017-01-18T22:59:00.420Z.