A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application.
                
            References
                    | Link | Resource | 
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-info-disc-PjTZ5r6C | Patch Vendor Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2021-08-04 18:15
Updated : 2023-11-07 03:36
NVD link : CVE-2021-34707
Mitre link : CVE-2021-34707
CVE.ORG link : CVE-2021-34707
JSON object : View
Products Affected
                cisco
- evolved_programmable_network_manager
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
