This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-25907 | A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. |
Thu, 31 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco evolved Programmable Network Manager Cisco prime Infrastructure |
|
| CPEs | cpe:2.3:a:cisco:evolved_programmable_network_manager:1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.3:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:2.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.1.5:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.2.0-fips:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.4.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.5.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.6.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.7.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.8.0:*:*:*:*:*:*:* cpe:2.3:a:cisco:prime_infrastructure:3.9.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco evolved Programmable Network Manager Cisco prime Infrastructure |
Fri, 15 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 Nov 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. | |
| Title | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Cross-Site Scripting Vulnerability | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-15T16:18:19.097Z
Reserved: 2021-11-02T13:28:29.040Z
Link: CVE-2022-20657
Updated: 2024-11-15T16:18:11.815Z
Status : Analyzed
Published: 2024-11-15T16:15:21.473
Modified: 2025-07-31T15:05:55.940
Link: CVE-2022-20657
No data.
OpenCVE Enrichment
No data.
EUVD