First published: Wed Apr 05 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Infrastructure | <=3.7 | |
Cisco Prime Infrastructure | >=3.10<3.10.2 | |
Cisco Prime Infrastructure | =3.8 | |
Cisco Prime Infrastructure | =3.8.1 | |
Cisco Prime Infrastructure | =3.9 | |
Cisco Prime Infrastructure | =3.9.1 | |
Cisco Evolved Programmable Network Manager | <5.0.2.5 | |
Cisco Evolved Programmable Network Manager | >=5.1<5.1.4.2 | |
Cisco Evolved Programmable Network Manager | >=6.0<6.0.2.1 | |
Cisco Evolved Programmable Network Manager | >=6.1<6.1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected software versions for CVE-2023-20130 are Cisco Prime Infrastructure 3.7 to 3.10.2, Cisco Prime Infrastructure 3.8, Cisco Prime Infrastructure 3.8.1, Cisco Prime Infrastructure 3.9, and Cisco Evolved Programmable Network Manager 5.0.2.5 to 6.1.1.1.
The severity level of CVE-2023-20130 is medium with a CVSS score of 6.5.
The vulnerabilities in CVE-2023-20130 include obtaining privileged information, cross-site scripting (XSS), and cross-site request forgery (CSRF) attacks.
A remote attacker can exploit CVE-2023-20130 by obtaining privileged information and conducting cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks.
You can find more information about CVE-2023-20130 on the Cisco Security Advisory page: <a href='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-eRPWAXLe'>Cisco Security Advisory</a>.