A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 31 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco evolved Programmable Network Manager
Cisco prime Infrastructure
CPEs cpe:2.3:a:cisco:evolved_programmable_network_manager:1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.2.0-fips:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.9.0:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco evolved Programmable Network Manager
Cisco prime Infrastructure

Fri, 15 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Title Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T16:18:19.097Z

Reserved: 2021-11-02T13:28:29.040Z

Link: CVE-2022-20657

cve-icon Vulnrichment

Updated: 2024-11-15T16:18:11.815Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T16:15:21.473

Modified: 2025-07-31T15:05:55.940

Link: CVE-2022-20657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.