All the vulnerabilites related to Cisco - Cisco Evolved Programmable Network Manager (EPNM)
cve-2021-34707
Vulnerability from cvelistv5
Published
2021-08-04 17:20
Modified
2024-11-07 22:04
Severity ?
EPSS score ?
Summary
Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Evolved Programmable Network Manager (EPNM) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210804 Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34707", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:41:02.901757Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:04:19.538Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-04T17:20:42", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210804 Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C" } ], "source": { "advisory": "cisco-sa-epnm-info-disc-PjTZ5r6C", "defect": [ [ "CSCvs67013" ] ], "discovery": "INTERNAL" }, "title": "Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-04T16:00:00", "ID": "CVE-2021-34707", "STATE": "PUBLIC", "TITLE": "Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Evolved Programmable Network Manager (EPNM)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "20210804 Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C" } ] }, "source": { "advisory": "cisco-sa-epnm-info-disc-PjTZ5r6C", "defect": [ [ "CSCvs67013" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34707", "datePublished": "2021-08-04T17:20:42.713361Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T22:04:19.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20222
Vulnerability from cvelistv5
Published
2023-08-16 21:39
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10.4 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-storedxss-tTjO62r", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-storedxss-tTjO62r" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10.4" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:24.048Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-storedxss-tTjO62r", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-storedxss-tTjO62r" } ], "source": { "advisory": "cisco-sa-pi-epnm-storedxss-tTjO62r", "defects": [ "CSCwf14099", "CSCwf15468" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20222", "datePublished": "2023-08-16T21:39:30.076Z", "dateReserved": "2022-10-27T18:47:50.368Z", "dateUpdated": "2024-08-02T09:05:36.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20657
Vulnerability from cvelistv5
Published
2024-11-15 15:39
Modified
2024-11-15 16:18
Severity ?
EPSS score ?
Summary
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-Site Scripting Vulnerability
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Evolved Programmable Network Manager (EPNM) |
Version: 3.0.1 Version: 3.1.2 Version: 1.2 Version: 3.1.1 Version: 3.1.3 Version: 3.1 Version: 3.0.3 Version: 3.0.2 Version: 3.0 Version: 2.2 Version: 1.1 Version: 2.1 Version: 2.0 Version: 4.1 Version: 4.1.1 Version: 4.0.3 Version: 4.0.1 Version: 4.0.2 Version: 4.0 Version: 5.0 Version: 5.0.1 Version: 5.1.1 Version: 5.1 Version: 5.0.2 Version: 5.1.2 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-20657", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:15:51.507495Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:18:19.097Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.1.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.8.0-FED" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;PI and Cisco\u0026nbsp;EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco\u0026nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:39:33.492Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-path-trav-zws324yn", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-path-trav-zws324yn" } ], "source": { "advisory": "cisco-sa-pi-epnm-path-trav-zws324yn", "defects": [ "CSCvz43419" ], "discovery": "EXTERNAL" }, "title": "Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20657", "datePublished": "2024-11-15T15:39:33.492Z", "dateReserved": "2021-11-02T13:28:29.040Z", "dateUpdated": "2024-11-15T16:18:19.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20656
Vulnerability from cvelistv5
Published
2024-11-15 15:36
Modified
2024-11-15 16:22
Severity ?
EPSS score ?
Summary
Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Path Traversal Vulnerability
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Evolved Programmable Network Manager (EPNM) |
Version: 3.0.1 Version: 3.1.2 Version: 1.2 Version: 3.1.1 Version: 3.1.3 Version: 3.1 Version: 3.0.3 Version: 3.0.2 Version: 3.0 Version: 2.2 Version: 1.1 Version: 2.1 Version: 2.0 Version: 4.1 Version: 4.1.1 Version: 4.0.3 Version: 4.0.1 Version: 4.0.2 Version: 4.0 Version: 5.0 Version: 5.0.1 Version: 5.1.1 Version: 5.1 Version: 5.0.2 Version: 5.1.2 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-20656", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:22:22.303656Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:22:46.877Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.1.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.8.0-FED" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;PI and Cisco\u0026nbsp;EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system.\r\n\r\nThis vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system.\r\nCisco\u0026nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-24", "description": "Path Traversal: \u0027../filedir\u0027", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:36:09.274Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-path-trav-zws324yn", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-path-trav-zws324yn" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ\u003c/a\u003e\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eAttention\u003c/strong\u003e: Simplifying the Cisco\u0026nbsp;portfolio includes the renaming of security products under one brand: Cisco\u0026nbsp;Secure. For more information, see \u003ca href=\"https://www.cisco.com/c/en/us/products/security/secure-names.html\"\u003eMeet Cisco\u0026nbsp;Secure", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ" } ], "source": { "advisory": "cisco-sa-pi-epnm-path-trav-zws324yn", "defects": [ "CSCvz43433" ], "discovery": "EXTERNAL" }, "title": "Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Path Traversal Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20656", "datePublished": "2024-11-15T15:36:09.274Z", "dateReserved": "2021-11-02T13:28:29.040Z", "dateUpdated": "2024-11-15T16:22:46.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20203
Vulnerability from cvelistv5
Published
2023-08-16 21:38
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10 Update 01 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-BFjSRJP5", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10 Update 01" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:57.205Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-BFjSRJP5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5" } ], "source": { "advisory": "cisco-sa-pi-epnm-BFjSRJP5", "defects": [ "CSCwf29121", "CSCwe77480" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20203", "datePublished": "2023-08-16T21:38:58.626Z", "dateReserved": "2022-10-27T18:47:50.367Z", "dateUpdated": "2024-08-02T09:05:35.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20205
Vulnerability from cvelistv5
Published
2023-08-16 21:38
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10 Update 01 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-BFjSRJP5", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10 Update 01" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:59.019Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-BFjSRJP5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5" } ], "source": { "advisory": "cisco-sa-pi-epnm-BFjSRJP5", "defects": [ "CSCwf29121", "CSCwe77122" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20205", "datePublished": "2023-08-16T21:38:42.295Z", "dateReserved": "2022-10-27T18:47:50.367Z", "dateUpdated": "2024-08-02T09:05:35.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20260
Vulnerability from cvelistv5
Published
2024-01-17 16:57
Modified
2024-11-13 19:51
Severity ?
EPSS score ?
Summary
A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10 Update 01 Version: 3.10.4 Version: 3.10.4 Update 01 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-wkZJeyeq", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20260", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-23T20:54:32.408511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T19:51:35.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10 Update 01" }, { "status": "affected", "version": "3.10.4" }, { "status": "affected", "version": "3.10.4 Update 01" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.0.2.6" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "5.1.4.4" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "6.0.3.1" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.1.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T15:42:32.625Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-wkZJeyeq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq" } ], "source": { "advisory": "cisco-sa-pi-epnm-wkZJeyeq", "defects": [ "CSCwf81865", "CSCwf83560" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20260", "datePublished": "2024-01-17T16:57:33.285Z", "dateReserved": "2022-10-27T18:47:50.373Z", "dateUpdated": "2024-11-13T19:51:35.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20257
Vulnerability from cvelistv5
Published
2024-01-17 16:55
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by submitting malicious input containing script or HTML content within requests that would stored within the application interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks against other users of the affected application.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10 Update 01 Version: 3.10.4 Version: 3.10.4 Update 01 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-wkZJeyeq", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10 Update 01" }, { "status": "affected", "version": "3.10.4" }, { "status": "affected", "version": "3.10.4 Update 01" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.0.2.6" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "5.1.4.4" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "6.0.3.1" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.1.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by submitting malicious input containing script or HTML content within requests that would stored within the application interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks against other users of the affected application." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T15:42:31.456Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-wkZJeyeq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq" } ], "source": { "advisory": "cisco-sa-pi-epnm-wkZJeyeq", "defects": [ "CSCwf81870", "CSCwf83565" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20257", "datePublished": "2024-01-17T16:55:42.034Z", "dateReserved": "2022-10-27T18:47:50.372Z", "dateUpdated": "2024-08-02T09:05:36.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20201
Vulnerability from cvelistv5
Published
2023-08-16 21:39
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10 Update 01 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-BFjSRJP5", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10 Update 01" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:56.556Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-BFjSRJP5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-BFjSRJP5" } ], "source": { "advisory": "cisco-sa-pi-epnm-BFjSRJP5", "defects": [ "CSCwf09318", "CSCwf29121" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20201", "datePublished": "2023-08-16T21:39:11.419Z", "dateReserved": "2022-10-27T18:47:50.366Z", "dateUpdated": "2024-08-02T09:05:36.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20271
Vulnerability from cvelistv5
Published
2024-01-17 16:56
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Prime Infrastructure |
Version: 2.0.0 Version: 2.0.10 Version: 2.0.39 Version: 2.1.0 Version: 2.1.1 Version: 2.1.2 Version: 2.1.56 Version: 2.2.0 Version: 2.2.1 Version: 2.2.2 Version: 2.2.3 Version: 2.2.10 Version: 2.2.8 Version: 2.2.4 Version: 2.2.7 Version: 2.2.5 Version: 2.2.9 Version: 2.2.1 Update 01 Version: 2.2.2 Update 03 Version: 2.2.2 Update 04 Version: 2.2.3 Update 02 Version: 2.2.3 Update 03 Version: 2.2.3 Update 04 Version: 2.2.3 Update 05 Version: 2.2.3 Update 06 Version: 3.0.0 Version: 3.0.1 Version: 3.0.2 Version: 3.0.3 Version: 3.0.4 Version: 3.0.6 Version: 3.0.5 Version: 3.0.7 Version: 3.1.0 Version: 3.1.1 Version: 3.1.7 Version: 3.1.5 Version: 3.1.2 Version: 3.1.3 Version: 3.1.4 Version: 3.1.6 Version: 3.2.2 Version: 3.2.0-FIPS Version: 3.2.1 Version: 3.3.0 Version: 3.3.1 Version: 3.3.0 Update 01 Version: 3.4.0 Version: 3.4.1 Version: 3.4.2 Version: 3.4.1 Update 01 Version: 3.4.1 Update 02 Version: 3.4.2 Update 01 Version: 3.5.0 Version: 3.5.1 Version: 3.5.0 Update 01 Version: 3.5.0 Update 02 Version: 3.5.0 Update 03 Version: 3.5.1 Update 01 Version: 3.5.1 Update 02 Version: 3.5.1 Update 03 Version: 3.6.0 Version: 3.6.0 Update 01 Version: 3.6.0 Update 02 Version: 3.6.0 Update 03 Version: 3.6.0 Update 04 Version: 2.1 Version: 2.2 Version: 3.2 Version: 3.4_DP1 Version: 3.4_DP3 Version: 3.4_DP2 Version: 3.5_DP1 Version: 3.4_DP7 Version: 3.4_DP10 Version: 3.4_DP5 Version: 3.1_DP15 Version: 3.4_DP11 Version: 3.4_DP8 Version: 3.7_DP1 Version: 3.3_DP4 Version: 3.10_DP1 Version: 3.8_DP1 Version: 3.7_DP2 Version: 3.6_DP1 Version: 3.1_DP16 Version: 3.5_DP4 Version: 3.3_DP3 Version: 3.2_DP2 Version: 3.4_DP4 Version: 3.1_DP14 Version: 3.1_DP6 Version: 3.1_DP9 Version: 3.4_DP6 Version: 3.2_DP3 Version: 3.4_DP9 Version: 3.3_DP2 Version: 3.2_DP1 Version: 3.1_DP10 Version: 3.9_DP1 Version: 3.3_DP1 Version: 3.1_DP13 Version: 3.5_DP2 Version: 3.1_DP12 Version: 3.1_DP4 Version: 3.5_DP3 Version: 3.1_DP8 Version: 3.1_DP7 Version: 3.2_DP4 Version: 3.1_DP11 Version: 3.1_DP5 Version: 3.7.0 Version: 3.7.1 Version: 3.7.1 Update 04 Version: 3.7.1 Update 06 Version: 3.7.1 Update 07 Version: 3.7.1 Update 03 Version: 3.7.0 Update 03 Version: 3.7.1 Update 01 Version: 3.7.1 Update 02 Version: 3.7.1 Update 05 Version: 3.8.0 Version: 3.8.1 Version: 3.8.1 Update 02 Version: 3.8.1 Update 04 Version: 3.8.1 Update 01 Version: 3.8.1 Update 03 Version: 3.8.0 Update 01 Version: 3.8.0 Update 02 Version: 3.9.0 Version: 3.9.1 Version: 3.9.1 Update 02 Version: 3.9.1 Update 03 Version: 3.9.1 Update 01 Version: 3.9.1 Update 04 Version: 3.9.0 Update 01 Version: 3.10.0 Version: 3.10.3 Version: 3.10.1 Version: 3.10.2 Version: 3.10 Update 01 Version: 3.10.4 Version: 3.10.4 Update 01 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-pi-epnm-wkZJeyeq", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10 Update 01" }, { "status": "affected", "version": "3.10.4" }, { "status": "affected", "version": "3.10.4 Update 01" } ] }, { "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.0.2.6" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "5.1.4.4" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "6.0.3.1" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.1.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-02T15:42:33.023Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-pi-epnm-wkZJeyeq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq" } ], "source": { "advisory": "cisco-sa-pi-epnm-wkZJeyeq", "defects": [ "CSCwf81862", "CSCwf83557" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20271", "datePublished": "2024-01-17T16:56:25.553Z", "dateReserved": "2022-10-27T18:47:50.373Z", "dateUpdated": "2024-08-02T09:05:36.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20514
Vulnerability from cvelistv5
Published
2024-11-06 16:30
Modified
2024-11-06 17:04
Severity ?
EPSS score ?
Summary
Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Evolved Programmable Network Manager (EPNM) |
Version: 3.0.1 Version: 3.1.2 Version: 1.2 Version: 3.1.1 Version: 3.1.3 Version: 3.1 Version: 3.0.3 Version: 3.0.2 Version: 3.0 Version: 2.2 Version: 1.1 Version: 2.1 Version: 2.0 Version: 4.1 Version: 4.1.1 Version: 4.0.3 Version: 4.0.1 Version: 4.0.2 Version: 4.0 Version: 5.0 Version: 5.0.1 Version: 5.1.1 Version: 5.1 Version: 5.0.2 Version: 5.1.2 Version: 5.1.3 Version: 5.1.4 Version: 6.1.1 Version: 6.1 Version: 6.0.0 Version: 6.0.1 Version: 6.0.2 Version: 7.0.0 Version: 1.2.5 Version: 1.2.6 Version: 2.0.1 Version: 1.2.2 Version: 1.2.3 Version: 1.2.4 Version: 1.2.7 Version: 1.2.1.2 Version: 2.2.1 Version: 2.1.3 Version: 2.0.2 Version: 2.0.3 Version: 2.1.2 Version: 2.0.4 Version: 2.1.1 Version: 5.0.2.5 Version: 5.1.4.3 Version: 6.0.2.1 Version: 6.1.1.1 Version: 5.0.2.1 Version: 5.0.2.2 Version: 5.0.2.3 Version: 5.0.2.4 Version: 5.1.4.1 Version: 5.1.4.2 Version: 2.1.4 Version: 2.2.4 Version: 2.2.3 Version: 2.2.5 Version: 5.1.3.2 Version: 5.1.3.1 Version: 6.0.1.1 Version: 4.1.1.2 Version: 4.1.1.1 Version: 4.0.3.1 Version: 2.0.1.1 Version: 2.1.1.3 Version: 2.1.1.1 Version: 2.1.1.4 Version: 2.0.4.2 Version: 2.0.4.1 Version: 2.1.2.2 Version: 2.1.2.3 Version: 2.0.2.1 Version: 2.1.3.4 Version: 2.1.3.3 Version: 2.1.3.2 Version: 2.1.3.5 Version: 2.2.1.2 Version: 2.2.1.1 Version: 2.2.1.4 Version: 2.2.1.3 Version: 1.2.4.2 Version: 1.2.2.4 Version: 6.0.3 Version: 5.1.4.4 Version: 5.0.2.6 Version: 6.0.3.1 Version: 6.1.2 Version: 6.1.1.2.2 Version: 6.1.2.1 Version: 6.1.2.2 Version: 7.1.1 Version: 7.1.2.1 Version: 7.0.1.3 Version: 7.1.3 Version: 7.1.2 Version: 7.0.1.2 Version: 7.0.1.1 Version: 7.0.1 Version: 7.1.0 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20514", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T17:04:18.651564Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T17:04:27.239Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Evolved Programmable Network Manager (EPNM)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.1.1" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "4.0.1" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "5.0.1" }, { "status": "affected", "version": "5.1.1" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "5.1.2" }, { "status": "affected", "version": "5.1.3" }, { "status": "affected", "version": "5.1.4" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.0.0" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "7.0.0" }, { "status": "affected", "version": "1.2.5" }, { "status": "affected", "version": "1.2.6" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "1.2.2" }, { "status": "affected", "version": "1.2.3" }, { "status": "affected", "version": "1.2.4" }, { "status": "affected", "version": "1.2.7" }, { "status": "affected", "version": "1.2.1.2" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.1.3" }, { "status": "affected", "version": "2.0.2" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "5.0.2.5" }, { "status": "affected", "version": "5.1.4.3" }, { "status": "affected", "version": "6.0.2.1" }, { "status": "affected", "version": "6.1.1.1" }, { "status": "affected", "version": "5.0.2.1" }, { "status": "affected", "version": "5.0.2.2" }, { "status": "affected", "version": "5.0.2.3" }, { "status": "affected", "version": "5.0.2.4" }, { "status": "affected", "version": "5.1.4.1" }, { "status": "affected", "version": "5.1.4.2" }, { "status": "affected", "version": "2.1.4" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "5.1.3.2" }, { "status": "affected", "version": "5.1.3.1" }, { "status": "affected", "version": "6.0.1.1" }, { "status": "affected", "version": "4.1.1.2" }, { "status": "affected", "version": "4.1.1.1" }, { "status": "affected", "version": "4.0.3.1" }, { "status": "affected", "version": "2.0.1.1" }, { "status": "affected", "version": "2.1.1.3" }, { "status": "affected", "version": "2.1.1.1" }, { "status": "affected", "version": "2.1.1.4" }, { "status": "affected", "version": "2.0.4.2" }, { "status": "affected", "version": "2.0.4.1" }, { "status": "affected", "version": "2.1.2.2" }, { "status": "affected", "version": "2.1.2.3" }, { "status": "affected", "version": "2.0.2.1" }, { "status": "affected", "version": "2.1.3.4" }, { "status": "affected", "version": "2.1.3.3" }, { "status": "affected", "version": "2.1.3.2" }, { "status": "affected", "version": "2.1.3.5" }, { "status": "affected", "version": "2.2.1.2" }, { "status": "affected", "version": "2.2.1.1" }, { "status": "affected", "version": "2.2.1.4" }, { "status": "affected", "version": "2.2.1.3" }, { "status": "affected", "version": "1.2.4.2" }, { "status": "affected", "version": "1.2.2.4" }, { "status": "affected", "version": "6.0.3" }, { "status": "affected", "version": "5.1.4.4" }, { "status": "affected", "version": "5.0.2.6" }, { "status": "affected", "version": "6.0.3.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.1.2.2" }, { "status": "affected", "version": "6.1.2.1" }, { "status": "affected", "version": "6.1.2.2" }, { "status": "affected", "version": "7.1.1" }, { "status": "affected", "version": "7.1.2.1" }, { "status": "affected", "version": "7.0.1.3" }, { "status": "affected", "version": "7.1.3" }, { "status": "affected", "version": "7.1.2" }, { "status": "affected", "version": "7.0.1.2" }, { "status": "affected", "version": "7.0.1.1" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "7.1.0" } ] }, { "defaultStatus": "unknown", "product": "Cisco Prime Infrastructure", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.5" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.6.0" }, { "status": "affected", "version": "3.7.0" }, { "status": "affected", "version": "3.4.0" }, { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "3.5.0" }, { "status": "affected", "version": "3.2.0-FIPS" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "3.8.0-FED" }, { "status": "affected", "version": "3.9.0" }, { "status": "affected", "version": "3.8.0" }, { "status": "affected", "version": "3.10.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "2.1.2" }, { "status": "affected", "version": "2.2.1" }, { "status": "affected", "version": "2.2.0" }, { "status": "affected", "version": "3.0.2" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.1" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "3.9.1" }, { "status": "affected", "version": "2.0.10" }, { "status": "affected", "version": "3.8.1" }, { "status": "affected", "version": "3.7.1" }, { "status": "affected", "version": "3.5.1" }, { "status": "affected", "version": "3.4.2" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.1.7" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.2.2" }, { "status": "affected", "version": "3.1.6" }, { "status": "affected", "version": "3.1.2" }, { "status": "affected", "version": "3.4.1" }, { "status": "affected", "version": "3.1.3" }, { "status": "affected", "version": "3.1.4" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "2.2.10" }, { "status": "affected", "version": "3.0.4" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "2.1.56" }, { "status": "affected", "version": "2.2.4" }, { "status": "affected", "version": "2.2.9" }, { "status": "affected", "version": "2.2.8" }, { "status": "affected", "version": "2.2.5" }, { "status": "affected", "version": "2.2.7" }, { "status": "affected", "version": "2.0.39" }, { "status": "affected", "version": "3.8_DP1" }, { "status": "affected", "version": "3.9_DP1" }, { "status": "affected", "version": "3.7_DP2" }, { "status": "affected", "version": "3.6_DP1" }, { "status": "affected", "version": "3.5_DP4" }, { "status": "affected", "version": "3.5_DP2" }, { "status": "affected", "version": "3.4_DP10" }, { "status": "affected", "version": "3.7_DP1" }, { "status": "affected", "version": "3.5_DP3" }, { "status": "affected", "version": "3.4_DP11" }, { "status": "affected", "version": "3.5_DP1" }, { "status": "affected", "version": "3.4_DP8" }, { "status": "affected", "version": "3.4_DP1" }, { "status": "affected", "version": "3.4_DP3" }, { "status": "affected", "version": "3.4_DP5" }, { "status": "affected", "version": "3.4_DP2" }, { "status": "affected", "version": "3.4_DP7" }, { "status": "affected", "version": "3.4_DP6" }, { "status": "affected", "version": "3.3_DP4" }, { "status": "affected", "version": "3.4_DP4" }, { "status": "affected", "version": "3.4_DP9" }, { "status": "affected", "version": "3.1_DP16" }, { "status": "affected", "version": "3.3_DP2" }, { "status": "affected", "version": "3.3_DP3" }, { "status": "affected", "version": "3.1_DP15" }, { "status": "affected", "version": "3.3_DP1" }, { "status": "affected", "version": "3.1_DP13" }, { "status": "affected", "version": "3.2_DP2" }, { "status": "affected", "version": "3.2_DP1" }, { "status": "affected", "version": "3.2_DP3" }, { "status": "affected", "version": "3.1_DP14" }, { "status": "affected", "version": "3.2_DP4" }, { "status": "affected", "version": "3.1_DP7" }, { "status": "affected", "version": "3.1_DP10" }, { "status": "affected", "version": "3.1_DP11" }, { "status": "affected", "version": "3.1_DP4" }, { "status": "affected", "version": "3.1_DP6" }, { "status": "affected", "version": "3.1_DP12" }, { "status": "affected", "version": "3.1_DP5" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.1_DP9" }, { "status": "affected", "version": "3.1_DP8" }, { "status": "affected", "version": "3.10_DP1" }, { "status": "affected", "version": "3.10.2" }, { "status": "affected", "version": "3.10.3" }, { "status": "affected", "version": "3.10" }, { "status": "affected", "version": "3.10.1" }, { "status": "affected", "version": "3.7.1 Update 03" }, { "status": "affected", "version": "3.7.1 Update 04" }, { "status": "affected", "version": "3.7.1 Update 06" }, { "status": "affected", "version": "3.7.1 Update 07" }, { "status": "affected", "version": "3.8.1 Update 01" }, { "status": "affected", "version": "3.8.1 Update 02" }, { "status": "affected", "version": "3.8.1 Update 03" }, { "status": "affected", "version": "3.8.1 Update 04" }, { "status": "affected", "version": "3.9.1 Update 01" }, { "status": "affected", "version": "3.9.1 Update 02" }, { "status": "affected", "version": "3.9.1 Update 03" }, { "status": "affected", "version": "3.9.1 Update 04" }, { "status": "affected", "version": "3.10 Update 01" }, { "status": "affected", "version": "3.4.2 Update 01" }, { "status": "affected", "version": "3.6.0 Update 04" }, { "status": "affected", "version": "3.6.0 Update 02" }, { "status": "affected", "version": "3.6.0 Update 03" }, { "status": "affected", "version": "3.6.0 Update 01" }, { "status": "affected", "version": "3.5.1 Update 03" }, { "status": "affected", "version": "3.5.1 Update 01" }, { "status": "affected", "version": "3.5.1 Update 02" }, { "status": "affected", "version": "3.7.0 Update 03" }, { "status": "affected", "version": "2.2.3 Update 05" }, { "status": "affected", "version": "2.2.3 Update 04" }, { "status": "affected", "version": "2.2.3 Update 06" }, { "status": "affected", "version": "2.2.3 Update 03" }, { "status": "affected", "version": "2.2.3 Update 02" }, { "status": "affected", "version": "2.2.1 Update 01" }, { "status": "affected", "version": "2.2.2 Update 03" }, { "status": "affected", "version": "2.2.2 Update 04" }, { "status": "affected", "version": "3.8.0 Update 01" }, { "status": "affected", "version": "3.8.0 Update 02" }, { "status": "affected", "version": "3.7.1 Update 01" }, { "status": "affected", "version": "3.7.1 Update 02" }, { "status": "affected", "version": "3.7.1 Update 05" }, { "status": "affected", "version": "3.9.0 Update 01" }, { "status": "affected", "version": "3.3.0 Update 01" }, { "status": "affected", "version": "3.4.1 Update 02" }, { "status": "affected", "version": "3.4.1 Update 01" }, { "status": "affected", "version": "3.5.0 Update 03" }, { "status": "affected", "version": "3.5.0 Update 01" }, { "status": "affected", "version": "3.5.0 Update 02" }, { "status": "affected", "version": "3.10.4" }, { "status": "affected", "version": "3.10.4 Update 01" }, { "status": "affected", "version": "3.10.4 Update 02" }, { "status": "affected", "version": "3.10.4 Update 03" }, { "status": "affected", "version": "3.10.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, low-privileged, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into a specific page of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:30:03.159Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-epnmpi-sxss-yyf2zkXs", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-yyf2zkXs" } ], "source": { "advisory": "cisco-sa-epnmpi-sxss-yyf2zkXs", "defects": [ "CSCwk83676" ], "discovery": "INTERNAL" }, "title": "Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20514", "datePublished": "2024-11-06T16:30:03.159Z", "dateReserved": "2023-11-08T15:08:07.689Z", "dateUpdated": "2024-11-06T17:04:27.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }