Versions
3.0.0
3.10.0
3.1.6
3.5.1 Update 03
2.2.3 Update 05
3.0.6
2.0.10
2.2.3 Update 06
3.1.4
3.6.0 Update 03
3.7.1 Update 05
2.2.1 Update 01
3.5_DP4
3.2_DP3
3.1_DP9
3.7_DP2
3.2_DP4
2.2.3 Update 03
3.8.1 Update 04
3.3_DP3
3.9.0 Update 01
3.1_DP4
2.2.2 Update 03
2.2.9
2.2.2
3.7.1 Update 06
3.1_DP16
3.1_DP14
3.10
2.0.39
3.4.0
3.7.1 Update 02
3.6.0 Update 04
3.7.1 Update 03
3.0.7
2.2.3 Update 02
3.9.1 Update 03
3.4_DP7
3.1_DP12
3.3.1
3.3.0 Update 01
3.4_DP4
3.5.0 Update 02
3.9.1 Update 04
3.9.1 Update 01
3.7.1
3.8.1 Update 01
3.6.0
next of 2.2
3.8.0 Update 01
2.2.8
3.4.2
3.0.2
3.5.1 Update 01
3.5.0 Update 01
3.10.3
3.10.2
3.0.5
3.9.0
3.4.1
3.10_DP1
3.5_DP3
2.1.56
3.5.0
3.5.1 Update 02
3.1.7
3.10.1
3.9.1 Update 02
3.5_DP2
2.1.2
3.1.2
3.7.1 Update 04
3.10.4
3.1_DP6
3.1.1
3.4_DP6
2.1.1
3.8.0-FED
3.4.2 Update 01
2.1.0
3.10.4 Update 03
3.6(0.0)
3.8.1 Update 03
2.2.0
3.1_DP5
2.2.5
3.4_DP1
3.4.1 Update 02
3.6.0 Update 02
3.8_DP1
3.3_DP2
2.2.4
3.1_DP7
2.2.10
2.1
3.2.2
3.5_DP1
2.2.2 Update 04
2.2
3.1_DP10
3.3.0
2.2.1
3.9_DP1
3.8.1
3.2_DP2
3.10 Update 01
3.4_DP11
3.4_DP2
3.8.0 Update 02
3.5.1
3.1_DP13
3.1_DP11
3.3_DP1
3.8.1 Update 02
2.2.3
3.1.0
3.10.5
3.2.0-FIPS
3.3_DP4
3.1_DP15
3.0.3
3.4_DP8
unspecified
3.5.0 Update 03
3.0.1
3.2.1
3.1.5
3.7.1 Update 01
3.1_DP8
3.8.0
3.1.3
3.4_DP3
3.2
3.9.1
3.6_DP1
3.10.4 Update 01
3.4_DP5
3.7_DP1
2.2.7
3.7.0 Update 03
3.4.1 Update 01
3.4
2.0.0
3.7.1 Update 07
3.7.0
3.10.4 Update 02
3.4_DP10
3.6.0 Update 01
2.2.3 Update 04
3.4_DP9
3.2_DP1
3.0.4
Recent CVEs
CVE-2022-20657
A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
CVE-2022-20656
A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system. This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
CVE-2024-20514
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, low-privileged, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into a specific page of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
CVE-2023-20260
A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system.
CVE-2023-20258
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. This vulnerability is due to improper processing of serialized Java objects by the affected application. An attacker could exploit this vulnerability by uploading a document containing malicious serialized Java objects to be processed by the affected application. A successful exploit could allow the attacker to cause the application to execute arbitrary commands.
CVE-2023-20271
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
CVE-2023-20257
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by submitting malicious input containing script or HTML content within requests that would stored within the application interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks against other users of the affected application.
CVE-2023-20222
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CVE-2023-20201
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.
CVE-2023-20203
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid credentials to access the web-based management interface of the affected device.