Multiple CVEs in Cisco EPNM and Prime Infrastructure
Posted on September 23, 2025 • 5 min read • 1,001 wordsDuring our research activities, we identified multiple vulnerabilities in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure. These vulnerabilities could allow a remote attacker, who is authenticated and has limited privileges, to execute malicious code on the client side, obtain sensitive information, or upload arbitrary files to a vulnerable system.
During our research activities, we identified multiple vulnerabilities in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure. The following vulnerabilities have been identified:
These vulnerabilities could allow a remote attacker, who is authenticated and has limited privileges, to execute malicious code on the client side, obtain sensitive information, or upload arbitrary files to a vulnerable system. The overall impact of these weaknesses lies in the possibility of compromising the confidentiality, integrity, and operational security of the affected systems.
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to obtain sensitive information from an affected system.
This issue has been assigned CVE-2025-20270.
This vulnerability is due to improper validation of requests to API endpoints. An attacker could exploit this vulnerability by sending a valid request to a specific API endpoint within the affected system. A successful exploit could allow a low-privileged user to view sensitive configuration information on the affected system that should be restricted. To exploit this vulnerability, an attacker must have access as a low-privileged user.
Vulnerability | CVSSv3.1 | Attack Vector |
---|---|---|
Information Disclosure | 4.3 | AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:X |
A successful exploit could allow the attacker to access sensitive configuration data through improperly validated API requests, compromising the confidentiality of the system. While it does not directly affect integrity or availability, the exposure of internal information could facilitate further attacks or unauthorized access.
Cisco has released software updates that fix this vulnerability. No workarounds exist.
Administrators should upgrade to a non-vulnerable release, as indicated in the “Fixed Software” section of the official advisory.
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system.
This issue has been assigned CVE-2025-20280.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker must have valid administrative credentials.
Vulnerability | CVSSv3.1 | Attack Vector |
---|---|---|
Stored Cross-Site Scripting | 4.8 | AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X |
A successful exploit could allow the attacker to inject malicious scripts into the Cisco EPNM or Prime Infrastructure interface, which are then executed in other users’ browsers. This compromises both confidentiality and integrity by exposing sensitive data and allowing unauthorized actions, though it does not directly affect system availability.
Cisco has released software updates that fix this vulnerability. No workarounds exist.
Administrators should upgrade to a non-vulnerable release, as indicated in the “Fixed Software” section of the official advisory.
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to upload arbitrary files to an affected device.
This issue has been assigned CVE-2025-20287.
This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system. To exploit this vulnerability, an attacker must have at least valid Config Managers credentials on the affected device.
Vulnerability | CVSSv3.1 | Attack Vector |
---|---|---|
Arbitrary File Upload | 4.3 | AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X |
A successful exploit could allow the attacker to upload arbitrary files to the Cisco EPNM system, potentially enabling the placement or execution of unauthorized content. This compromises the integrity of the system by allowing tampering with its file structure, though it does not directly affect confidentiality or availability.
Cisco has released software updates that fix this vulnerability. No workarounds exist.
Administrators should upgrade to a non-vulnerable release, as indicated in the “Fixed Software” section of the official advisory.
Cisco thanks Paolo Grossetti and Matteo Piciarelli of Consulthink S.p.A. for responsibly reporting these vulnerabilities.