Cisco Prime Infrastructure 和 Cisco EPNM 任意文件读取漏洞(CVE-2023-20129)

CVE编号

CVE-2023-20129

利用情况

暂无

补丁情况

N/A

披露时间

2023-04-06
漏洞描述
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 cisco evolved_programmable_network_manager * Up to
(excluding)
5.0.2.5
运行在以下环境
应用 cisco evolved_programmable_network_manager * From
(including)
5.1
Up to
(excluding)
5.1.4.2
运行在以下环境
应用 cisco evolved_programmable_network_manager * From
(including)
6.0
Up to
(excluding)
6.0.2.1
运行在以下环境
应用 cisco evolved_programmable_network_manager * From
(including)
6.1
Up to
(excluding)
6.1.1.1
运行在以下环境
应用 cisco prime_infrastructure * Up to
(including)
3.7
运行在以下环境
应用 cisco prime_infrastructure * From
(including)
3.10
Up to
(excluding)
3.10.2
运行在以下环境
应用 cisco prime_infrastructure 3.8 -
运行在以下环境
应用 cisco prime_infrastructure 3.8.1 -
运行在以下环境
应用 cisco prime_infrastructure 3.9 -
运行在以下环境
应用 cisco prime_infrastructure 3.9.1 -
CVSS3评分
6.5
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-22 对路径名的限制不恰当(路径遍历)
阿里云安全产品覆盖情况