ID

VAR-202108-0818


CVE

CVE-2021-34707


TITLE

Pillow Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

DESCRIPTION

A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 1.62

sources: NVD: CVE-2021-34707 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-394949 // VULMON: CVE-2021-34707

AFFECTED PRODUCTS

vendor:ciscomodel:evolved programmable network managerscope:lteversion:5.0

Trust: 1.0

sources: NVD: CVE-2021-34707

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-34707
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2021-34707
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202108-423
value: MEDIUM

Trust: 0.6

VULHUB: VHN-394949
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-34707
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-34707
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-394949
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-34707
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-394949 // VULMON: CVE-2021-34707 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202108-423 // NVD: CVE-2021-34707 // NVD: CVE-2021-34707

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-394949 // NVD: CVE-2021-34707

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-423

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:Cisco Evolved Programmable Network Manager Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158946

Trust: 0.6

title:Cisco: Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-epnm-info-disc-PjTZ5r6C

Trust: 0.1

sources: VULMON: CVE-2021-34707 // CNNVD: CNNVD-202108-423

EXTERNAL IDS

db:NVDid:CVE-2021-34707

Trust: 1.8

db:CNNVDid:CNNVD-202108-423

Trust: 0.7

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.2630

Trust: 0.6

db:CS-HELPid:SB2021080517

Trust: 0.6

db:VULHUBid:VHN-394949

Trust: 0.1

db:VULMONid:CVE-2021-34707

Trust: 0.1

sources: VULHUB: VHN-394949 // VULMON: CVE-2021-34707 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202108-423 // NVD: CVE-2021-34707

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-epnm-info-disc-pjtz5r6c

Trust: 2.5

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021080517

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2630

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-394949 // VULMON: CVE-2021-34707 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202108-423 // NVD: CVE-2021-34707

SOURCES

db:VULHUBid:VHN-394949
db:VULMONid:CVE-2021-34707
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202108-423
db:NVDid:CVE-2021-34707

LAST UPDATE DATE

2024-08-14T12:23:08.563000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-394949date:2021-08-11T00:00:00
db:VULMONid:CVE-2021-34707date:2021-08-11T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202108-423date:2021-08-12T00:00:00
db:NVDid:CVE-2021-34707date:2023-11-07T03:36:08.940

SOURCES RELEASE DATE

db:VULHUBid:VHN-394949date:2021-08-04T00:00:00
db:VULMONid:CVE-2021-34707date:2021-08-04T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202108-423date:2021-08-04T00:00:00
db:NVDid:CVE-2021-34707date:2021-08-04T18:15:09.947