Description
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access.

This vulnerability is due to improper authorization checks on a REST API endpoint of an affected device. An attacker could exploit this vulnerability by querying the affected endpoint. A successful exploit could allow the attacker to view session information of active Cisco EPNM users, including users with administrative privileges, which could result in the affected device being compromised.
Published: 2026-04-01
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Sensitive Session Data
Action: Apply Patch
AI Analysis

Impact

A flaw in the web‑based management interface of Cisco Evolved Programmable Network Manager allows an authenticated attacker with low privileges to query a REST API endpoint that lacks proper authorization checks. By issuing requests to this endpoint, the attacker can obtain session information of active EPNM users, including those with administrative rights. This could enable the attacker to glean credentials or other privileged data that may facilitate a full compromise of the affected device.

Affected Systems

The vulnerability affects Cisco Evolved Programmable Network Manager. No specific affected software versions are listed in the data, so all deployments of this product should be considered potentially impacted until a vendor‑released patch is applied.

Risk and Exploitability

The CVSS score of 8 indicates high severity, and the exploitation requires only remote authenticated access with low privileges. Although the EPSS score is not available, the fact that a low‑privilege attacker can gather sensitive session information represents a significant compromise risk. The vulnerability is not listed in the CISA KEV catalog, suggesting no public exploits have been documented yet, but the attack vector is inferred to be a remote web interface call.

Generated by OpenCVE AI on April 2, 2026 at 02:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco EPNM patch or upgrade to a version where the vulnerability is fixed.
  • Verify that REST API access is restricted to authorized users and disable any undocumented endpoints if possible.

Generated by OpenCVE AI on April 2, 2026 at 02:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco evolved Programmable Network Manager
Vendors & Products Cisco
Cisco evolved Programmable Network Manager

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker with low privileges to access sensitive information that they are not authorized to access. This vulnerability is due to improper authorization checks on a REST API endpoint of an affected device.&nbsp;An attacker could exploit this vulnerability by querying the affected endpoint. A successful exploit could allow the attacker to view session information of active Cisco EPNM users, including users with administrative privileges, which could result in the affected device being compromised.
Title Cisco Evolved Programmable Network Manager Improper Authorization Vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Evolved Programmable Network Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-01T18:19:17.434Z

Reserved: 2025-10-08T11:59:15.386Z

Link: CVE-2026-20155

cve-icon Vulnrichment

Updated: 2026-04-01T18:19:12.438Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:31.430

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20155

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:29Z

Weaknesses