Show filters
97 Total Results
Displaying 21-30 of 97
Sort by:
Attacker Value
Unknown

CVE-2024-12829

Disclosure Date: December 20, 2024 (last updated January 07, 2025)
Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ExecManagerImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24015.
Attacker Value
Unknown

CVE-2024-4578

Disclosure Date: June 27, 2024 (last updated June 28, 2024)
This Advisory describes an issue that impacts Arista Wireless Access Points. Any entity with the ability to authenticate via SSH to an affected AP as the “config” user is able to cause a privilege escalation via spawning a bash shell. The SSH CLI session does not require high permissions to exploit this vulnerability, but the config password is required to establish the session. The spawned shell is able to obtain root privileges.
0
Attacker Value
Unknown

CVE-2024-27889

Disclosure Date: March 04, 2024 (last updated March 05, 2024)
Multiple SQL Injection vulnerabilities exist in the reporting application of the Arista Edge Threat Management - Arista NG Firewall (NGFW). A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges.
0
Attacker Value
Unknown

CVE-2023-6068

Disclosure Date: March 04, 2024 (last updated March 05, 2024)
On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some
0
Attacker Value
Unknown

CVE-2023-24547

Disclosure Date: December 06, 2023 (last updated December 12, 2023)
On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config.
Attacker Value
Unknown

CVE-2023-3646

Disclosure Date: August 29, 2023 (last updated October 08, 2023)
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
Attacker Value
Unknown

CVE-2023-24548

Disclosure Date: August 29, 2023 (last updated October 08, 2023)
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
Attacker Value
Unknown

CVE-2023-24546

Disclosure Date: June 13, 2023 (last updated October 08, 2023)
On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.
Attacker Value
Unknown

CVE-2023-24512

Disclosure Date: April 25, 2023 (last updated October 08, 2023)
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
Attacker Value
Unknown

CVE-2023-24513

Disclosure Date: April 11, 2023 (last updated October 08, 2023)
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.