A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
History

Thu, 31 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco evolved Programmable Network Manager
Cisco prime Infrastructure
CPEs cpe:2.3:a:cisco:evolved_programmable_network_manager:1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.2.0-fips:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.9.0:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco evolved Programmable Network Manager
Cisco prime Infrastructure

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Title Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-11-15T15:39:33.492Z

Updated: 2024-11-15T16:18:19.097Z

Reserved: 2021-11-02T13:28:29.040Z

Link: CVE-2022-20657

cve-icon Vulnrichment

Updated: 2024-11-15T16:18:11.815Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T16:15:21.473

Modified: 2025-07-31T15:05:55.940

Link: CVE-2022-20657

cve-icon Redhat

No data.