Show filters
97 Total Results
Displaying 11-20 of 97
Sort by:
Attacker Value
Unknown

CVE-2024-47520

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
A user with advanced report application access rights can perform actions for which they are not authorized
0
Attacker Value
Unknown

CVE-2024-47519

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
Backup uploads to ETM subject to man-in-the-middle interception
0
Attacker Value
Unknown

CVE-2024-47518

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
Specially constructed queries targeting ETM could discover active remote access sessions
0
Attacker Value
Unknown

CVE-2024-47517

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access
0
Attacker Value
Unknown

CVE-2024-7095

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
On affected platforms running Arista EOS with SNMP configured, if “snmp-server transmit max-size” is configured, under some circumstances a specially crafted packet can cause the snmpd process to leak memory. This may result in the snmpd process being terminated (causing SNMP requests to time out until snmpd is restarted) and memory pressure for other processes on the switch. Increased memory pressure can cause processes other than snmpd to be at risk for unexpected termination as well.
0
Attacker Value
Unknown

CVE-2024-5872

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
On affected platforms running Arista EOS, a specially crafted packet with incorrect VLAN tag might be copied to CPU, which may cause incorrect control plane behavior related to the packet, such as route flaps, multicast routes learnt, etc.
0
Attacker Value
Unknown

CVE-2024-6437

Disclosure Date: January 10, 2025 (last updated January 11, 2025)
On affected platforms running Arista EOS with one of the following features configured to redirect IP traffic to a next hop: policy-based routing (PBR), BGP Flowspec, or interface traffic policy -- certain IP traffic such as IPv4 packets with IP options may bypass the feature's set nexthop action and be slow-path forwarded (FIB routed) by the kernel as the packets are trapped to the CPU instead of following the redirect action's destination.
0
Attacker Value
Unknown

CVE-2024-12832

Disclosure Date: December 20, 2024 (last updated January 07, 2025)
Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325.
Attacker Value
Unknown

CVE-2024-12831

Disclosure Date: December 20, 2024 (last updated January 07, 2025)
Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the uvm_login module. The issue results from incorrect authorization. An attacker can leverage this to escalate privileges to resources normally protected from the user. Was ZDI-CAN-24324.
Attacker Value
Unknown

CVE-2024-12830

Disclosure Date: December 20, 2024 (last updated January 07, 2025)
Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the custom_handler method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-24019.