Home

Description

A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, low-privileged, remote attacker to retrieve arbitrary files from the underlying file system on an affected device. This vulnerability is due to insufficient input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface on an affected device. A successful exploit could allow the attacker to access sensitive files from the affected device.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-20 | Updated 2025-08-20 | Assigner cisco




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

External Control of File Name or Path

Product status

Default status
unknown

7.0.0
affected

7.1.1
affected

7.1.2.1
affected

7.1.3
affected

7.1.2
affected

7.0.1.2
affected

7.0.1.1
affected

7.0.1
affected

7.1.0
affected

8.0.0
affected

8.0.0.1
affected

8.1.0
affected

8.0.1
affected

Default status
unknown

3.10.0
affected

3.10.2
affected

3.10.3
affected

3.10
affected

3.10.1
affected

3.10 Update 01
affected

3.10.4
affected

3.10.4 Update 01
affected

3.10.4 Update 02
affected

3.10.4 Update 03
affected

3.10.5
affected

3.10.6
affected

3.10.6 Update 01
affected

References

sec.cloudapps.cisco.com/...dvisory/cisco-sa-pi-epnm-TET4GxBX (cisco-sa-pi-epnm-TET4GxBX)

bst.cloudapps.cisco.com/bugsearch/bug/CSCvd36820 (CSCvd36820)

sec.cloudapps.cisco.com/...tyAdvisory/cisco-sa-20180328-smi2

sec.cloudapps.cisco.com/...enter/viewErp.x?alertId=ERP-66682 (Cisco Event Response: March 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication)

cve.org (CVE-2025-20269)

nvd.nist.gov (CVE-2025-20269)

Download JSON