Home Cisco CVE-2026-20155
Back to Cisco

CVE-2026-20155

Cisco Evolved Programmable Network Manager - Web-based Management Interface

Cisco CVSS 8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information. This could result in the affected device being compromised, allowing the attacker to view session information of active Cisco EPNM users, including users with administrative privileges."

Anticipated Attack Path

  1. 1. An attacker gains low-privilege access to the Cisco EPNM web-based management interface
  2. 2. The attacker queries the vulnerable REST API endpoint to access sensitive information
  3. 3. The attacker uses the obtained information to further compromise the network or gain administrative privileges

Am I Vulnerable?

  • Is your Cisco EPNM version affected by the vulnerability?
  • Do you have low-privilege users accessing the web-based management interface?
  • Have you applied the latest security patches and updates to your Cisco EPNM?

Operational Audit Arsenal

Target Type Technical Object
Target Asset Cisco EPNM Web UI
Standard Path Management Plane / Web UI

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to network management and monitoring capabilities

Internal Work Notes

CVE-2026-20155: Potential unauthorized access to sensitive information in Cisco EPNM web-based management interface

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.