{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20123","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.377Z","datePublished":"2026-02-04T16:11:56.495Z","dateUpdated":"2026-02-04T16:40:42.923Z"},"containers":{"cna":{"title":"Cisco Prime Infrastructure and Evolved Programmable Network Manager Open Redirect Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.\r\n\r\nThis vulnerability is due to improper input validation of the parameters in the HTTP request. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-pi-redirect-6sX82dN","name":"cisco-sa-epnm-pi-redirect-6sX82dN"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-epnm-pi-redirect-6sX82dN","discovery":"EXTERNAL","defects":["CSCwo86413"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"URL Redirection to Untrusted Site ('Open Redirect')","type":"cwe","cweId":"CWE-601"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Evolved Programmable Network Manager (EPNM)","versions":[{"version":"7.1.1","status":"affected"},{"version":"7.1.2.1","status":"affected"},{"version":"7.1.3","status":"affected"},{"version":"7.1.2","status":"affected"},{"version":"7.1.0","status":"affected"},{"version":"8.0.0","status":"affected"},{"version":"8.0.0.1","status":"affected"},{"version":"7.1.3.1","status":"affected"},{"version":"7.1.4","status":"affected"},{"version":"8.1.0","status":"affected"},{"version":"8.0.1","status":"affected"},{"version":"7.1.4.1","status":"affected"},{"version":"8.0.1.1","status":"affected"}],"defaultStatus":"unknown"},{"vendor":"Cisco","product":"Cisco Prime Infrastructure","versions":[{"version":"3.10.0","status":"affected"},{"version":"3.10.2","status":"affected"},{"version":"3.10.3","status":"affected"},{"version":"3.10","status":"affected"},{"version":"3.10.1","status":"affected"},{"version":"3.10 Update 01","status":"affected"},{"version":"3.10.4","status":"affected"},{"version":"3.10.4 Update 01","status":"affected"},{"version":"3.10.4 Update 02","status":"affected"},{"version":"3.10.4 Update 03","status":"affected"},{"version":"3.10.5","status":"affected"},{"version":"3.10.6","status":"affected"},{"version":"3.10.6 Update 01","status":"affected"},{"version":"3.10.6 Security Update 03","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-02-04T16:11:56.495Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-04T16:40:37.285394Z","id":"CVE-2026-20123","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-04T16:40:42.923Z"}}]}}