First published: Wed Feb 22 2017(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvc30999. Known Affected Releases: 12.0(0.98000.280). Known Fixed Releases: 11.0(1.23900.3) 12.0(0.98000.180) 12.0(0.98000.422) 12.0(0.98000.541) 12.0(0.98000.6).
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager Session Management Edition | =11.0\(1.10000.10\) | |
Cisco Unified Communications Manager Session Management Edition | =11.5\(1.10000.6\) | |
=11.0\(1.10000.10\) | ||
=11.5\(1.10000.6\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3829 is rated as a high-severity vulnerability due to its potential for allowing cross-site scripting (XSS) attacks.
To mitigate CVE-2017-3829, it is recommended to upgrade to the latest version of Cisco Unified Communications Manager.
CVE-2017-3829 affects users of Cisco Unified Communications Manager versions 11.0(1.10000.10) and 11.5(1.10000.6).
CVE-2017-3829 could allow an unauthenticated remote attacker to conduct a cross-site scripting (XSS) attack.
No, CVE-2017-3829 can be exploited by an unauthenticated attacker, making it particularly concerning.