A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco evolved Programmable Network Manager Cisco prime Infrastructure |
|
CPEs | cpe:2.3:a:cisco:evolved_programmable_network_manager:1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.2.0-fips:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.8.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.9.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco evolved Programmable Network Manager Cisco prime Infrastructure |
Fri, 15 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 15 Nov 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. | |
Title | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-Site Scripting Vulnerability | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2024-11-15T15:39:33.492Z
Updated: 2024-11-15T16:18:19.097Z
Reserved: 2021-11-02T13:28:29.040Z
Link: CVE-2022-20657

Updated: 2024-11-15T16:18:11.815Z

Status : Analyzed
Published: 2024-11-15T16:15:21.473
Modified: 2025-07-31T15:05:55.940
Link: CVE-2022-20657

No data.