First published: Wed Aug 16 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <7.1 | |
Cisco Prime Infrastructure | <3.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20205 is medium.
The affected software versions of CVE-2023-20205 are Cisco Prime Infrastructure up to and excluding version 3.10.4 and Cisco Evolved Programmable Network Manager up to and excluding version 7.1.
An attacker can exploit CVE-2023-20205 by conducting a stored cross-site scripting (XSS) attack against a user of the web-based management interface of Cisco Prime Infrastructure or Cisco Evolved Programmable Network Manager.
Yes, authentication is required for the attacker to exploit CVE-2023-20205.
Yes, Cisco has released software updates to address the vulnerabilities in Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager. It is recommended to upgrade to the latest available version.