First published: Fri Mar 03 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <7.0 | |
Cisco Prime Infrastructure | <3.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2023-20069 is a stored cross-site scripting (XSS) vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager.
The vulnerability CVE-2023-20069 occurs when an authenticated, remote attacker exploits a flaw in the web-based management interface of Cisco Prime Infrastructure and Cisco EPN Manager to inject malicious scripts that can be executed by other users of the interface.
The severity of the vulnerability CVE-2023-20069 is rated as medium with a CVSS score of 5.4.
To fix the vulnerability CVE-2023-20069, it is recommended to apply the necessary patches or updates provided by Cisco.
You can find more information about the vulnerability CVE-2023-20069 in the Cisco Security Advisory at the following link: [Cisco Security Advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pi-epnm-xss-mZShH2J)