Impact
A flaw in the web‑based management interface of Cisco Evolved Programmable Network Manager allows an authenticated attacker with low privileges to query a REST API endpoint that lacks proper authorization checks. By issuing requests to this endpoint, the attacker can obtain session information of active EPNM users, including those with administrative rights. This could enable the attacker to glean credentials or other privileged data that may facilitate a full compromise of the affected device.
Affected Systems
The vulnerability affects Cisco Evolved Programmable Network Manager. No specific affected software versions are listed in the data, so all deployments of this product should be considered potentially impacted until a vendor‑released patch is applied.
Risk and Exploitability
The CVSS score of 8 indicates high severity, and the exploitation requires only remote authenticated access with low privileges. Although the EPSS score is not available, the fact that a low‑privilege attacker can gather sensitive session information represents a significant compromise risk. The vulnerability is not listed in the CISA KEV catalog, suggesting no public exploits have been documented yet, but the attack vector is inferred to be a remote web interface call.
OpenCVE Enrichment