VYPR
Medium severity4.3NVD Advisory· Published May 6, 2026· Updated May 6, 2026

CVE-2026-20189

CVE-2026-20189

Description

A vulnerability in the log file download functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to download arbitrary log files from the server.

This vulnerability is due to insufficient authorization checks on the download service API. An attacker could exploit this vulnerability by submitting a crafted URL request to an affected device. A successful exploit could allow the attacker to download sensitive log files that they would otherwise not have authorization to access. To exploit this vulnerability, the attacker must have valid credentials to access the web-based management interface of the affected device.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cisco Prime Infrastructure log download API lacks authorization checks, allowing authenticated attackers to download arbitrary log files.

Vulnerability

Overview

CVE-2026-20189 is an information disclosure vulnerability in the log file download functionality of Cisco Prime Infrastructure. The root cause is insufficient authorization checks on the download service API, which fails to properly verify whether an authenticated user has permission to access specific log files [1].

Exploitation

An attacker with valid credentials to the web-based management interface can exploit this vulnerability by sending a crafted URL request to the affected device. No additional privileges beyond standard authentication are required, making the attack surface relatively broad for any authorized user of the system [1].

Impact

Successful exploitation allows the attacker to download sensitive log files that they would otherwise not be authorized to access. These logs may contain confidential operational data, configuration details, or other information that could aid further attacks against the network reconnaissance [1].

Mitigation

Cisco has released software updates to address this vulnerability. No workarounds are available. Administrators should apply the fixed software version as soon as possible. At the time of publication, all configurations of Cisco Prime Infrastructure were considered vulnerable, while Cisco Evolved Programmable Network Manager (EPNM) is confirmed not affected [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.