CVE-2026-20189 PUBLISHED

Cisco Prime Infrastructure Information Disclosure Vulnerability

Assigner: cisco
Reserved: 08.10.2025 Published: 06.05.2026 Updated: 06.05.2026

A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to download arbitrary log files from the server.

This vulnerability is due to insufficient authorization checks on the download service API. An attacker could exploit this vulnerability by submitting a crafted URL request to an affected device. A successful exploit could allow the attacker to download sensitive log files that they would otherwise not have authorization to access. To exploit this vulnerability, the attacker must have valid credentials to access the web-based management interface of the affected device.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 4.3

Product Status

Vendor Cisco
Product Cisco Prime Infrastructure
Versions Default: unknown
  • Version 3.6.0 is affected
  • Version 3.7.0 is affected
  • Version 3.4.0 is affected
  • Version 3.3.0 is affected
  • Version 3.5.0 is affected
  • Version 3.2.0-FIPS is affected
  • Version 3.8.0-FED is affected
  • Version 3.9.0 is affected
  • Version 3.8.0 is affected
  • Version 3.10.0 is affected
  • Version 3.9.1 is affected
  • Version 3.8.1 is affected
  • Version 3.7.1 is affected
  • Version 3.5.1 is affected
  • Version 3.4.2 is affected
  • Version 3.3.1 is affected
  • Version 3.2.1 is affected
  • Version 3.2.2 is affected
  • Version 3.4.1 is affected
  • Version 3.10.2 is affected
  • Version 3.10.3 is affected
  • Version 3.10 is affected
  • Version 3.10.1 is affected
  • Version 3.7.1 Update 03 is affected
  • Version 3.7.1 Update 04 is affected
  • Version 3.7.1 Update 06 is affected
  • Version 3.7.1 Update 07 is affected
  • Version 3.8.1 Update 01 is affected
  • Version 3.8.1 Update 02 is affected
  • Version 3.8.1 Update 03 is affected
  • Version 3.8.1 Update 04 is affected
  • Version 3.9.1 Update 01 is affected
  • Version 3.9.1 Update 02 is affected
  • Version 3.9.1 Update 03 is affected
  • Version 3.9.1 Update 04 is affected
  • Version 3.10 Update 01 is affected
  • Version 3.4.2 Update 01 is affected
  • Version 3.6.0 Update 04 is affected
  • Version 3.6.0 Update 02 is affected
  • Version 3.6.0 Update 03 is affected
  • Version 3.6.0 Update 01 is affected
  • Version 3.5.1 Update 03 is affected
  • Version 3.5.1 Update 01 is affected
  • Version 3.5.1 Update 02 is affected
  • Version 3.7.0 Update 03 is affected
  • Version 3.8.0 Update 01 is affected
  • Version 3.8.0 Update 02 is affected
  • Version 3.7.1 Update 01 is affected
  • Version 3.7.1 Update 02 is affected
  • Version 3.7.1 Update 05 is affected
  • Version 3.9.0 Update 01 is affected
  • Version 3.3.0 Update 01 is affected
  • Version 3.4.1 Update 02 is affected
  • Version 3.4.1 Update 01 is affected
  • Version 3.5.0 Update 03 is affected
  • Version 3.5.0 Update 01 is affected
  • Version 3.5.0 Update 02 is affected
  • Version 3.10.4 is affected
  • Version 3.10.4 Update 01 is affected
  • Version 3.10.4 Update 02 is affected
  • Version 3.10.4 Update 03 is affected
  • Version 3.10.5 is affected
  • Version 3.10.6 is affected
  • Version 3.10.6 Update 01 is affected
  • Version 3.10.6 Update 02 is affected

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

References

Problem Types

  • Missing Authorization cwe