First published: Wed Aug 04 2021(Updated: )
A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34707 is a vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) that could allow an authenticated, remote attacker to access sensitive data on an affected system.
CVE-2021-34707 allows an attacker to access sensitive data on an affected system through the REST API of Cisco EPNM.
CVE-2021-34707 has a severity rating of 6.5 (medium).
An authenticated, remote attacker can exploit CVE-2021-34707 by sending specially crafted requests to the REST API of Cisco EPNM in order to access sensitive data.
Cisco has released a security advisory with remediation steps to address CVE-2021-34707. Please refer to the Cisco Security Advisory linked in the references for more information.