Known Vulnerabilities for Evolved Programmable Network Manager by Cisco

Listed below are 10 of the newest known vulnerabilities associated with "Evolved Programmable Network Manager" by "Cisco".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-20659 A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (E... 6.1 - MEDIUM 2022-02-17 2022-02-25
CVE-2021-34784 A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Netwo... 5.4 - MEDIUM 2021-11-04 2021-11-06
CVE-2021-34733 A vulnerability in the CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an ... 5.5 - MEDIUM 2021-09-02 2021-09-10
CVE-2021-34707 A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote att... 6.5 - MEDIUM 2021-08-04 2021-08-11
CVE-2021-1487 A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Evolved Programmable Network (EPN) Ma... 8.8 - HIGH 2021-05-22 2021-05-27
CVE-2021-1306 A vulnerability in the restricted shell of Cisco Evolved Programmable Network (EPN) Manager, Cisco Identity Services Engine (... 3.4 - LOW 2021-05-22 2021-05-27
CVE-2019-1821 A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Netwo... 9.8 - CRITICAL 2019-05-16 2019-06-19
CVE-2019-1820 A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (E... 6.5 - MEDIUM 2019-05-16 2019-10-09
CVE-2019-1819 A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (E... 6.5 - MEDIUM 2019-05-16 2019-10-09
CVE-2019-1818 A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (E... 6.5 - MEDIUM 2019-05-16 2019-10-09

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCiscoEvolved Programmable Network Manager3.0.3AllAllAll
ApplicationCiscoEvolved Programmable Network Manager3.0.2AllAllAll
ApplicationCiscoEvolved Programmable Network Manager3.0.1AllAllAll
ApplicationCiscoEvolved Programmable Network Manager3.0.0AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.2.1AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.2AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.1.3AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.1.2AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.1.1AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.1AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.0\(4.0.45b\)AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.0.4AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.0.3AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.0.2AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.0.1AllAllAll
ApplicationCiscoEvolved Programmable Network Manager2.0AllAllAll
ApplicationCiscoEvolved Programmable Network Manager1.2.700AllAllAll
ApplicationCiscoEvolved Programmable Network Manager1.2.600AllAllAll
ApplicationCiscoEvolved Programmable Network Manager1.2.500AllAllAll
ApplicationCiscoEvolved Programmable Network Manager1.2.400AllAllAll

Popular searches for Evolved Programmable Network Manager

Cisco Evolved Programmable Network Manager

www.cisco.com/c/en/us/products/cloud-systems-management/evolved-programmable-network-epn-manager/index.html

Cisco Evolved Programmable Network Manager Cisco Evolved Programmable Network Manager b ` ^ provides simplified, converged, multilayer management of carrier-grade networks of all sizes.

Cisco Systems NetworkManager Programmable calculator Computer network Carrier grade Multilayer switch Provisioning (telecommunications) End-to-end principle Technological convergence Automation Software deployment Network monitoring Reduce (computer algebra system) Converged infrastructure Time to market Domain-specific language Computer hardware Computing platform Information model Management

Cisco Security Advisory: Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability

tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-pi-epn-codex

Cisco Security Advisory: Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerability Cisco # ! Prime Infrastructure PI and Cisco Evolved Programmable Network Manager EPNM could allow an unauthenticated remote attacker to execute arbitrary code with root privileges on the underlying operating system. The vulnerability exists because affected devices with the High Availability HA feature enabled do not properly perform input validation. An attacker could exploit this vulnerability by uploading a malicious file to either the HA active or standby device. A successful exploit could allow the attacker to execute arbitrary code with root-level privileges on the underlying operating system. Cisco CiscoSecurityAdvisory/ isco -sa-20191106-pi-epn-codex

Vulnerability (computing) Cisco Systems Arbitrary code execution NetworkManager Programmable calculator Exploit (computer security) High availability Operating system Security hacker Superuser Software Computer security Windows Metafile vulnerability Patch (computing) Malware Representational state transfer Data validation Computer file Upload Privilege (computing)

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report