CVE-2021-34707

A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*

History

11 Aug 2021, 18:21

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
CWE CWE-200
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C - Patch, Vendor Advisory

04 Aug 2021, 19:01

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-04 18:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-34707

Mitre link : CVE-2021-34707

CVE.ORG link : CVE-2021-34707


JSON object : View

Products Affected

cisco

  • evolved_programmable_network_manager
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor