We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20272

Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Blind SQL Injection Vulnerability



Description

A vulnerability in a subset of REST APIs of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, low-privileged, remote attacker to conduct a blind SQL injection attack. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected API. A successful exploit could allow the attacker to view data in some database tables on an affected device.

Reserved 2024-10-10 | Published 2025-07-16 | Updated 2025-07-16 | Assigner cisco


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unknown

3.0.1
affected

3.1.2
affected

1.2
affected

3.1.1
affected

3.1.3
affected

3.1
affected

3.0.3
affected

3.0.2
affected

3.0
affected

2.2
affected

1.1
affected

2.1
affected

2.0
affected

4.1
affected

4.1.1
affected

4.0.3
affected

4.0.1
affected

4.0.2
affected

4.0
affected

5.0
affected

5.0.1
affected

5.1.1
affected

5.1
affected

5.0.2
affected

5.1.2
affected

5.1.3
affected

5.1.4
affected

6.1.1
affected

6.1
affected

6.0.0
affected

6.0.1
affected

6.0.2
affected

7.0.0
affected

1.2.5
affected

1.2.6
affected

2.0.1
affected

1.2.2
affected

1.2.3
affected

1.2.4
affected

1.2.7
affected

1.2.1.2
affected

2.2.1
affected

2.1.3
affected

2.0.2
affected

2.0.3
affected

2.1.2
affected

2.0.4
affected

2.1.1
affected

5.0.2.5
affected

5.1.4.3
affected

6.0.2.1
affected

6.1.1.1
affected

5.0.2.1
affected

5.0.2.2
affected

5.0.2.3
affected

5.0.2.4
affected

5.1.4.1
affected

5.1.4.2
affected

2.1.4
affected

2.2.4
affected

2.2.3
affected

2.2.5
affected

5.1.3.2
affected

5.1.3.1
affected

6.0.1.1
affected

4.1.1.2
affected

4.1.1.1
affected

4.0.3.1
affected

2.0.1.1
affected

2.1.1.3
affected

2.1.1.1
affected

2.1.1.4
affected

2.0.4.2
affected

2.0.4.1
affected

2.1.2.2
affected

2.1.2.3
affected

2.0.2.1
affected

2.1.3.4
affected

2.1.3.3
affected

2.1.3.2
affected

2.1.3.5
affected

2.2.1.2
affected

2.2.1.1
affected

2.2.1.4
affected

2.2.1.3
affected

1.2.4.2
affected

1.2.2.4
affected

6.0.3
affected

5.1.4.4
affected

5.0.2.6
affected

6.0.3.1
affected

6.1.2
affected

6.1.1.2.2
affected

6.1.2.1
affected

6.1.2.2
affected

7.1.1
affected

7.1.2.1
affected

7.0.1.3
affected

7.1.3
affected

7.1.2
affected

7.0.1.2
affected

7.0.1.1
affected

7.0.1
affected

7.1.0
affected

8.0.0
affected

6.1.2.3
affected

8.0.0.1
affected

7.1.3.1
affected

7.1.4
affected

8.1.0
affected

Default status
unknown

3.0.0
affected

3.1.0
affected

3.1.5
affected

2.1
affected

2.0.0
affected

3.6.0
affected

3.7.0
affected

3.4.0
affected

3.3.0
affected

3.2
affected

3.5.0
affected

3.2.0-FIPS
affected

2.2
affected

3.8.0-FED
affected

3.9.0
affected

3.8.0
affected

3.10.0
affected

3.1.1
affected

2.1.2
affected

2.2.1
affected

2.2.0
affected

3.0.2
affected

3.0.3
affected

3.0.1
affected

2.2.2
affected

2.2.3
affected

2.1.0
affected

2.1.1
affected

3.9.1
affected

2.0.10
affected

3.8.1
affected

3.7.1
affected

3.5.1
affected

3.4.2
affected

3.3.1
affected

3.1.7
affected

3.2.1
affected

3.2.2
affected

3.1.6
affected

3.1.2
affected

3.4.1
affected

3.1.3
affected

3.1.4
affected

3.0.6
affected

2.2.10
affected

3.0.4
affected

3.0.5
affected

2.1.56
affected

2.2.4
affected

2.2.9
affected

2.2.8
affected

2.2.5
affected

2.2.7
affected

2.0.39
affected

3.8_DP1
affected

3.9_DP1
affected

3.7_DP2
affected

3.6_DP1
affected

3.5_DP4
affected

3.5_DP2
affected

3.4_DP10
affected

3.7_DP1
affected

3.5_DP3
affected

3.4_DP11
affected

3.5_DP1
affected

3.4_DP8
affected

3.4_DP1
affected

3.4_DP3
affected

3.4_DP5
affected

3.4_DP2
affected

3.4_DP7
affected

3.4_DP6
affected

3.3_DP4
affected

3.4_DP4
affected

3.4_DP9
affected

3.1_DP16
affected

3.3_DP2
affected

3.3_DP3
affected

3.1_DP15
affected

3.3_DP1
affected

3.1_DP13
affected

3.2_DP2
affected

3.2_DP1
affected

3.2_DP3
affected

3.1_DP14
affected

3.2_DP4
affected

3.1_DP7
affected

3.1_DP10
affected

3.1_DP11
affected

3.1_DP4
affected

3.1_DP6
affected

3.1_DP12
affected

3.1_DP5
affected

3.0.7
affected

3.1_DP9
affected

3.1_DP8
affected

3.10_DP1
affected

3.10.2
affected

3.10.3
affected

3.10
affected

3.10.1
affected

3.7.1 Update 03
affected

3.7.1 Update 04
affected

3.7.1 Update 06
affected

3.7.1 Update 07
affected

3.8.1 Update 01
affected

3.8.1 Update 02
affected

3.8.1 Update 03
affected

3.8.1 Update 04
affected

3.9.1 Update 01
affected

3.9.1 Update 02
affected

3.9.1 Update 03
affected

3.9.1 Update 04
affected

3.10 Update 01
affected

3.4.2 Update 01
affected

3.6.0 Update 04
affected

3.6.0 Update 02
affected

3.6.0 Update 03
affected

3.6.0 Update 01
affected

3.5.1 Update 03
affected

3.5.1 Update 01
affected

3.5.1 Update 02
affected

3.7.0 Update 03
affected

2.2.3 Update 05
affected

2.2.3 Update 04
affected

2.2.3 Update 06
affected

2.2.3 Update 03
affected

2.2.3 Update 02
affected

2.2.1 Update 01
affected

2.2.2 Update 03
affected

2.2.2 Update 04
affected

3.8.0 Update 01
affected

3.8.0 Update 02
affected

3.7.1 Update 01
affected

3.7.1 Update 02
affected

3.7.1 Update 05
affected

3.9.0 Update 01
affected

3.3.0 Update 01
affected

3.4.1 Update 02
affected

3.4.1 Update 01
affected

3.5.0 Update 03
affected

3.5.0 Update 01
affected

3.5.0 Update 02
affected

3.10.4
affected

3.10.4 Update 01
affected

3.10.4 Update 02
affected

3.10.4 Update 03
affected

3.10.5
affected

3.10.6
affected

3.10.6 Update 01
affected

References

sec.cloudapps.cisco.com/...sory/cisco-sa-piepnm-bsi-25JJqsbb (cisco-sa-piepnm-bsi-25JJqsbb)

cve.org (CVE-2025-20272)

nvd.nist.gov (CVE-2025-20272)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20272

Support options

Helpdesk Chat, Email, Knowledgebase