First published: Wed Apr 05 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Infrastructure | <=3.7 | |
Cisco Prime Infrastructure | >=3.10<3.10.2 | |
Cisco Prime Infrastructure | =3.8 | |
Cisco Prime Infrastructure | =3.8.1 | |
Cisco Prime Infrastructure | =3.9 | |
Cisco Prime Infrastructure | =3.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected versions of Cisco Prime Infrastructure are 3.7, 3.8, 3.8.1, 3.9, and 3.9.1.
The vulnerabilities include the ability for a remote attacker to obtain privileged information, conduct cross-site scripting (XSS) attacks, and cross-site request forgery (CSRF) attacks.
The severity of CVE-2023-20127 is medium with a CVSS score of 6.5.
A remote attacker can exploit these vulnerabilities to obtain privileged information, perform XSS attacks, and conduct CSRF attacks.
To mitigate the vulnerabilities, it is recommended to upgrade to the latest version of Cisco Prime Infrastructure and follow the recommendations provided by Cisco in their security advisory.