Unauth Remote URL Redirect in Cisco EPNM Web UI
CVE-2026-20123 Published on February 4, 2026
Cisco Prime Infrastructure and Evolved Programmable Network Manager Open Redirect Vulnerability
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.
This vulnerability is due to improper input validation of the parameters in the HTTP request. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page.
Vulnerability Analysis
CVE-2026-20123 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
What is an Open Redirect Vulnerability?
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
CVE-2026-20123 has been classified to as an Open Redirect vulnerability or weakness.
Products Associated with CVE-2026-20123
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-20123 are published in these products:
Affected Versions
Cisco Evolved Programmable Network Manager (EPNM):- Version 7.1.1 is affected.
- Version 7.1.2.1 is affected.
- Version 7.1.3 is affected.
- Version 7.1.2 is affected.
- Version 7.1.0 is affected.
- Version 8.0.0 is affected.
- Version 8.0.0.1 is affected.
- Version 7.1.3.1 is affected.
- Version 7.1.4 is affected.
- Version 8.1.0 is affected.
- Version 8.0.1 is affected.
- Version 7.1.4.1 is affected.
- Version 8.0.1.1 is affected.
- Version 3.10.0 is affected.
- Version 3.10.2 is affected.
- Version 3.10.3 is affected.
- Version 3.10 is affected.
- Version 3.10.1 is affected.
- Version 3.10 Update 01 is affected.
- Version 3.10.4 is affected.
- Version 3.10.4 Update 01 is affected.
- Version 3.10.4 Update 02 is affected.
- Version 3.10.4 Update 03 is affected.
- Version 3.10.5 is affected.
- Version 3.10.6 is affected.
- Version 3.10.6 Update 01 is affected.
- Version 3.10.6 Security Update 03 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.