First published: Wed Aug 16 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <7.1 | |
Cisco Prime Infrastructure | <3.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20203 is a vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) that allows an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack.
CVE-2023-20203 allows a user of the interface on an affected device to be targeted by a stored cross-site scripting (XSS) attack.
CVE-2023-20203 has a severity rating of medium (5.4) according to the Common Vulnerability Scoring System (CVSS).
Cisco Evolved Programmable Network Manager (EPNM) versions up to and excluding 7.1, and Cisco Prime Infrastructure versions up to and excluding 3.10.4 are affected by CVE-2023-20203.
Cisco has released a security advisory with recommendations on how to mitigate CVE-2023-20203, which can be found at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5