First published: Wed Aug 16 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <=7.0 | |
Cisco Prime Infrastructure | <=3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20222 is medium.
CVE-2023-20222 affects Cisco Prime Infrastructure versions up to 3.10.
CVE-2023-20222 affects Cisco Evolved Programmable Network Manager versions up to 7.0.
The CWE ID for CVE-2023-20222 is 79.
To fix the XSS vulnerability, update Cisco Prime Infrastructure to version 3.10 or later, and update Cisco Evolved Programmable Network Manager to version 7.0 or later.