Executive Risk Summary
"A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information. This could result in the affected device being compromised, allowing the attacker to view session information of active Cisco EPNM users, including users with administrative privileges."
Anticipated Attack Path
- 1. An attacker gains low-privilege access to the Cisco EPNM web-based management interface
- 2. The attacker queries the vulnerable REST API endpoint to access sensitive information
- 3. The attacker uses the obtained information to further compromise the network or gain administrative privileges
Am I Vulnerable?
- Is your Cisco EPNM version affected by the vulnerability?
- Do you have low-privilege users accessing the web-based management interface?
- Have you applied the latest security patches and updates to your Cisco EPNM?
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Potential disruption to network management and monitoring capabilities
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly