Arista Networks Arista Eos vulnerabilities

7 known vulnerabilities affecting arista_networks/arista_eos.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2023-24510HIGHCVSS 7.5≥ 4.25.0F, ≤ 4.25.10M≥ 4.26.0F, ≤ 4.26.9M+3 more2023-06-05
CVE-2023-24510 [HIGH] CWE-755 CVE-2023-24510: On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to r On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
cvelistv5nvd
CVE-2023-24509HIGHCVSS 7.8v4.23.0 4.23.13M≥ 4.28.0, ≤ 4.28.3M+4 more2023-04-13
CVE-2023-24509 [HIGH] CWE-269 CVE-2023-24509: On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
cvelistv5nvd
CVE-2021-28509MEDIUMCVSS 6.1≥ 4.23, ≤ 4.23.11≥ 4.24, ≤ 4.24.9+3 more2022-05-26
CVE-2021-28509 [MEDIUM] CWE-255 CVE-2021-28509: This advisory documents the impact of an internally found vulnerability in Arista EOS state streamin This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak MACsec sensitive data in clear text in CVP to other authorized users, which could cause MACsec traf
cvelistv5nvd
CVE-2021-28508MEDIUMCVSS 6.1≥ 4.23, ≤ 4.23.11≥ 4.24, ≤ 4.24.9+3 more2022-05-26
CVE-2021-28508 [MEDIUM] CWE-255 CVE-2021-28508: This advisory documents the impact of an internally found vulnerability in Arista EOS state streamin This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak IPsec sensitive data in clear text in CVP to other authorized users, which could cause IPsec traffi
cvelistv5nvd
CVE-2021-28503CRITICALCVSS 9.8≥ EOS-4.23, < EOS-4.23.10≥ EOS-4.24, < EOS-4.24.8+2 more2022-02-04
CVE-2021-28503 [CRITICAL] CWE-305 CVE-2021-28503: The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials w The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI.
cvelistv5nvd
CVE-2021-28500HIGHCVSS 7.8≥ 4.26.1F, ≤ 4.26.0≥ 4.25.4.M, ≤ 4.25.0+5 more2022-01-14
CVE-2021-28500 [HIGH] CWE-285 CVE-2021-28500: An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by th An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
cvelistv5nvd
CVE-2021-28496MEDIUMCVSS 6.5≥ EOS-4.22, ≤ EOS-4.22.12≥ EOS-4.23, < EOS-4.23.10+3 more2021-10-21
CVE-2021-28496 [MEDIUM] CWE-311 CVE-2021-28496: On systems running Arista EOS and CloudEOS with the affected release version, when using shared secr On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.
cvelistv5nvd