CVE-2021-34707

A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:11

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C - Patch, Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C - Patch, Vendor Advisory

Information

Published : 2021-08-04 18:15

Updated : 2024-11-21 06:11


NVD link : CVE-2021-34707

Mitre link : CVE-2021-34707

CVE.ORG link : CVE-2021-34707


JSON object : View

Products Affected

cisco

  • evolved_programmable_network_manager
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor