A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C | Patch Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C - Patch, Vendor Advisory |
Information
Published : 2021-08-04 18:15
Updated : 2024-11-21 06:11
NVD link : CVE-2021-34707
Mitre link : CVE-2021-34707
CVE.ORG link : CVE-2021-34707
JSON object : View
Products Affected
cisco
- evolved_programmable_network_manager
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor