All the vulnerabilites related to arista - 7020r
Vulnerability from fkie_nvd
Published
2023-01-26 21:15
Modified
2024-11-21 05:59
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@arista.com | https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076 | Exploit, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076 | Exploit, Mitigation, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1978B5F4-4405-4E7C-B0A9-45FF6FBBC1DA", "versionEndExcluding": "4.23.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "59C68E33-DDB0-473A-BCEA-0769924F3F8D", "versionEndExcluding": "4.24.8", "versionStartIncluding": "4.24.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F3649E5-79A3-4A34-8EB8-31B8F40753F2", "versionEndExcluding": "4.25.6", "versionStartIncluding": "4.25.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC4A4F-A4A6-4C0A-A144-9635F5DBC972", "versionEndExcluding": "4.26.4", "versionStartIncluding": "4.26.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "60DB1F59-64F8-4EC0-8C56-2AB5E2316CEA", "versionEndExcluding": "4.27.1", "versionStartIncluding": "4.27.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:7020r:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3371EEF-9D7A-4EF6-A435-A0F1034E5EE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*", "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D74C0B-E470-4D45-98E2-775DE43997DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B2CAA23-003C-43E6-87CE-61E4369C2D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7445075-D130-472C-B259-6BACE678541D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF3FA52A-3A67-4515-9790-598860102893", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "6336F166-FAD3-4846-84B9-45F5FAA3D437", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8EFEEA5-0FC4-4FFC-BF5D-BDBAA1B55C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2959C68-8731-4F37-B9E7-61E5936D3D8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FB3395-8D13-4477-A46E-37A88272CFAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*", "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BAE58E-F4B5-4C8F-9EEB-5A0F38A96F0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6466FE3-DCE8-4DA5-B893-2BA864F73BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C02B50F5-B316-4081-BC9E-6F1778049096", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "21CB1AAF-FC82-4A80-9932-42E8EFA3906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "60FC964C-9835-443A-A584-3A5D6022E914", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "8143579F-AD53-4D74-AE3E-4D465DCD7A57", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280sr3k-48yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "79AB0F1D-ACCA-490C-96F2-FC23A8611CB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:*", "matchCriteriaId": "78FE473B-CA6E-4E8D-8DBF-676B1ECBB185", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7308x3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F1EF943-154C-4B5B-B803-E186FEA8C5A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8862F74-E399-41EE-A081-62D99A7C1755", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F16261D-639F-4CAB-BDA6-EF3F277E663C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*", "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C61DCC-D1CF-4CE5-9634-4BE3E071E83E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC651584-113E-4859-9F14-12D62F3BD626", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "583725F6-8583-425C-A847-700DBB9169E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C6A4B3C-FF12-4DCD-9945-8450AD0BDEED", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE1BB565-2668-4242-8A00-5CC9C30B9AC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "15F1A605-8836-4A64-AC5E-ADAB34F8F104", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8A047A-9FD9-4AE1-9E47-457A46BAE3A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "019B0670-389B-4A4E-8C72-52202E3AA8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8387CCEA-F00C-4F1F-B966-ACF8B16F1D22", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7508r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "55AE2A1C-A4FD-423B-A77E-2E24C2310A6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7512r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4B0D708-B426-4CA1-BE87-08BD14B7EACE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D19E86BF-AA91-4262-8EF9-B7FC48C6F3F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "58443CDE-33D8-4460-A861-CDC07431AA22", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "64BE8C68-FE98-4162-A3D3-54494D5444F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7804r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "A54F3D32-5A07-4791-90BF-96BD8A24C2F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F078B04-2DA0-4A4B-BB1A-408DC14CB61F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable." }, { "lang": "es", "value": "Para ciertos sistemas que ejecutan EOS, un paquete de protocolo de tiempo de precisi\u00f3n (PTP) de un mensaje de administraci\u00f3n/se\u00f1alizaci\u00f3n con un valor de tipo, longitud y valor (TLV) no v\u00e1lido hace que el agente PTP se reinicie. Los reinicios repetidos del servicio har\u00e1n que el servicio no est\u00e9 disponible." } ], "id": "CVE-2021-28510", "lastModified": "2024-11-21T05:59:48.603", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@arista.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-26T21:15:22.147", "references": [ { "source": "psirt@arista.com", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076" } ], "sourceIdentifier": "psirt@arista.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "psirt@arista.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-05 22:15
Modified
2024-11-21 07:48
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EBD228-42BD-48F2-A9FA-C7F007A401A3", "versionEndIncluding": "4.25.10m", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "341CA00E-8BDE-4BF9-90D4-7B07FC484D18", "versionEndExcluding": "4.26.10m", "versionStartIncluding": "4.26.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "65C3AA23-CE24-48EE-B471-A03F451C6F35", "versionEndExcluding": "4.27.10m", "versionStartIncluding": "4.27.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "255A4F4F-1563-4557-BCBB-3BB1309A8889", "versionEndExcluding": "4.28.7m", "versionStartIncluding": "4.28.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "24621B26-04A1-4693-BCB4-437544C08B50", "versionEndExcluding": "4.29.2f", "versionStartIncluding": "4.29.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:arista:ceos:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6833D11-7AB5-41CC-83AE-FE28913DDFB8", "vulnerable": false }, { "criteria": "cpe:2.3:a:arista:cloudeos:-:*:*:*:*:*:*:*", "matchCriteriaId": "362F2E0F-3D40-444F-87F3-21CA70B1AD04", "vulnerable": false }, { "criteria": "cpe:2.3:a:arista:veos:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0B16F-F18E-48F9-87A5-AE0D9E5C3FAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC3D5B4-3B6F-4F15-9CAA-B0D08B53FFC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010t-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CCF6152-815E-4B3C-AE4B-CA598BEBD020", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010tx-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E00C871-8EB3-4241-95F3-83A524A79FB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010tx-48-dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC52FD-29BE-4037-9A7C-264ACF9F6C0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020r:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3371EEF-9D7A-4EF6-A435-A0F1034E5EE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020sr-24c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7781CB15-3452-47D9-A961-8B09F2E9AEC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020sr-32c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A31FB8-512E-43EF-8F87-E02E35F5251E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020tr-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CBFF922-28D7-42D6-8796-91AD9A178D28", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020tra-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "561B4042-DFD3-4BC0-9C5F-74799A7E92C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*", "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D832798-DA45-4F9E-AA31-5D088253A28A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130-16g3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFA321D-F4A5-434C-BB39-D2B2687001D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130-48g3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE67B8-F326-48B7-AB82-04FE8C2E37E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130-96s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3264E086-4E90-41D0-8583-8FCF3CE4885D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D74C0B-E470-4D45-98E2-775DE43997DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B2CAA23-003C-43E6-87CE-61E4369C2D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7445075-D130-472C-B259-6BACE678541D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF3FA52A-3A67-4515-9790-598860102893", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "6336F166-FAD3-4846-84B9-45F5FAA3D437", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7160-32cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "7620401C-FB14-46F1-979B-B21194F90945", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7160-48tc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DFC236-44B3-4EEF-8937-4F86EE99EB45", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7160-48yc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "823E5569-C918-40E6-A2C5-7C415E4ADEF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8EFEEA5-0FC4-4FFC-BF5D-BDBAA1B55C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2959C68-8731-4F37-B9E7-61E5936D3D8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FB3395-8D13-4477-A46E-37A88272CFAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170b-64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EE3572E-A724-4057-8776-7A95528DCEE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720df-48y:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FCDB83-38D5-4F02-97E2-BBEF891DCDD7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dp-24s:-:*:*:*:*:*:*:*", "matchCriteriaId": "80EAF795-EB62-4A86-A0FC-A09008E631A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dp-48s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA03BA0B-BB2D-41CF-BA2E-B21604D6FBC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dt-24s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE185FD-0D4D-4862-B513-BC68BF3F9F7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dt-48s:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C2150F-2FD6-452F-8C56-7413E3EB8FDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dt-48y:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A568A1-BA88-458E-B69A-0A2A6C594728", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*", "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:722xpm-48y4:-:*:*:*:*:*:*:*", "matchCriteriaId": "15876058-5E5D-4C87-83A3-592ADCA0AA6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:722xpm-48zy8:-:*:*:*:*:*:*:*", "matchCriteriaId": "426308A9-D534-4465-865C-39BC70548B00", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BAE58E-F4B5-4C8F-9EEB-5A0F38A96F0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260qx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "83A3811A-EB0E-464B-86E7-0E369935A507", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260sx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "58296832-AA93-4EAE-96BD-28EC368F8391", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6466FE3-DCE8-4DA5-B893-2BA864F73BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "21CB1AAF-FC82-4A80-9932-42E8EFA3906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "60FC964C-9835-443A-A584-3A5D6022E914", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7358x4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC38094-A539-425D-A2B6-770FAF0FC3C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*", "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7388x5:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66E706E-56FB-4A49-BD90-76A8CB6BE391", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:750:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BD5D5BB-96D6-43F5-A394-829E7866AF3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C61DCC-D1CF-4CE5-9634-4BE3E071E83E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC651584-113E-4859-9F14-12D62F3BD626", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "583725F6-8583-425C-A847-700DBB9169E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C6A4B3C-FF12-4DCD-9945-8450AD0BDEED", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE1BB565-2668-4242-8A00-5CC9C30B9AC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "15F1A605-8836-4A64-AC5E-ADAB34F8F104", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8A047A-9FD9-4AE1-9E47-457A46BAE3A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "019B0670-389B-4A4E-8C72-52202E3AA8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D19E86BF-AA91-4262-8EF9-B7FC48C6F3F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "58443CDE-33D8-4460-A861-CDC07431AA22", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "64BE8C68-FE98-4162-A3D3-54494D5444F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart." } ], "id": "CVE-2023-24510", "lastModified": "2024-11-21T07:48:01.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@arista.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-05T22:15:11.717", "references": [ { "source": "psirt@arista.com", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" } ], "sourceIdentifier": "psirt@arista.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "psirt@arista.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-10 19:15
Modified
2024-11-21 04:27
Severity ?
Summary
A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
arista | extensible_operating_system | * | |
arista | extensible_operating_system | * | |
arista | extensible_operating_system | * | |
arista | extensible_operating_system | * | |
arista | extensible_operating_system | 4.17 | |
arista | extensible_operating_system | 4.18 | |
arista | extensible_operating_system | 4.22.1f | |
arista | 7020r | - | |
arista | 7280e | - | |
arista | 7280r | - | |
arista | 7280r2 | - | |
arista | 7280r3 | - | |
arista | 7500e | - | |
arista | 7500r | - | |
arista | 7500r2 | - | |
arista | 7500r3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF0622F4-B19E-4D53-A0AF-481F0D65AA87", "versionEndIncluding": "4.19.12m", "versionStartIncluding": "4.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1A9BBA3-708A-4F20-A9C1-54B1368D1BA8", "versionEndIncluding": "4.20.14m", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F31FBFC-C81E-4BC1-AC4E-FBD0F0CD00B8", "versionEndIncluding": "4.21.2.3f", "versionStartIncluding": "4.21.0f", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F87620-E066-4250-9745-A8B842612AFE", "versionEndIncluding": "4.21.7", "versionStartIncluding": "4.21.3f", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:extensible_operating_system:4.17:*:*:*:*:*:*:*", "matchCriteriaId": "7DB48708-D409-4379-9F2C-170F3A1B53BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:extensible_operating_system:4.18:*:*:*:*:*:*:*", "matchCriteriaId": "2C0823B5-1F76-4712-A17A-C43DCAA189DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:extensible_operating_system:4.22.1f:*:*:*:*:*:*:*", "matchCriteriaId": "A96FAAFE-DB6E-40CA-A0FF-C9C76C8DF1C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:arista:7020r:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3371EEF-9D7A-4EF6-A435-A0F1034E5EE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6466FE3-DCE8-4DA5-B893-2BA864F73BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C02B50F5-B316-4081-BC9E-6F1778049096", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "21CB1AAF-FC82-4A80-9932-42E8EFA3906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "60FC964C-9835-443A-A584-3A5D6022E914", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C61DCC-D1CF-4CE5-9634-4BE3E071E83E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC651584-113E-4859-9F14-12D62F3BD626", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "583725F6-8583-425C-A847-700DBB9169E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C6A4B3C-FF12-4DCD-9945-8450AD0BDEED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)" }, { "lang": "es", "value": "Se ha encontrado una vulnerabilidad en la implementaci\u00f3n del protocolo Label Distribution Protocol (LDP) en EOS. En condiciones de carrera, el agente de LDP puede establecer una sesi\u00f3n de LDP con un peer malicioso, permitiendo potencialmente la posibilidad de un ataque de Denegaci\u00f3n de Servicio (DoS) sobre las actualizaciones de ruta y, a su vez, conllevando potencialmente a una condici\u00f3n Out of Memory (OOM) que es perjudicial para el reenv\u00edo de tr\u00e1fico. Las versiones EOS afectadas incluyen: tren de publicaciones de 4.22: 4.22.1F y versiones anteriores; tren de publicaciones de 4.21: 4.21.0F hasta 4.21.2.3F, 4.21.3F hasta 4.21.7.1M; tren de publicaciones de 4.20: 4.20.14M y versiones anteriores; tren de publicaciones de 4.19: 4.19.12M y versiones anteriores; trenes de publicaciones de fin de soporte (4.18 y 4.17)" } ], "id": "CVE-2019-14810", "lastModified": "2024-11-21T04:27:24.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-10T19:15:10.950", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2023-24510
Vulnerability from cvelistv5
Published
2023-06-05 00:00
Modified
2025-01-08 17:46
Severity ?
EPSS score ?
Summary
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Arista Networks | Arista EOS |
Version: 4.25.0F < Version: 4.26.0F < Version: 4.27.0F < Version: 4.28.0F < Version: 4.29.0F < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:04.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24510", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T17:46:21.374238Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T17:46:55.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Arista EOS", "vendor": "Arista Networks", "versions": [ { "lessThanOrEqual": "4.25.10M", "status": "affected", "version": "4.25.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.26.9M", "status": "affected", "version": "4.26.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.27.9M", "status": "affected", "version": "4.27.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.28.6.1M", "status": "affected", "version": "4.28.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.29.1F", "status": "affected", "version": "4.29.0F", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "In order to be vulnerable to CVE-2023-24510, the following condition must be met:\nAt least two \u201cip helper-address\u201d commands for the DHCP server are configured on the same interface.\n \u2013 Scenario One: One command uses \u201csource-interface\u201d, with or without being in a VRF. The second command does not use a source-interface and does not use a VRF.\n \u2013 Scenario Two: One command is run inside of a VRF. The second command does not use a source-interface and does not use a VRF." } ], "datePublic": "2023-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T00:00:00", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" } ], "solutions": [ { "lang": "en", "value": "CVE-2023-24510 has been fixed in the following releases:\n - 4.29.2F and later releases in the 4.29.x train\n - 4.28.7M and later releases in the 4.28.x train\n - 4.27.10M and later releases in the 4.27.x train\n - 4.26.10M and later releases in the 4.26.x train" } ], "source": { "advisory": "Security Advisory 0087", "defect": [ "BUG753188" ], "discovery": "INTERNAL" }, "title": "On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.", "workarounds": [ { "lang": "en", "value": "The hotfix https://www.arista.com/support/advisories-notices/sa-download?sa=87-SecurityAdvisory87_Hotfix.swix can be used to remediate CVE-2023-24510. The hotfix only applies to the releases listed below and no other releases:\n - 4.29.1F and below releases in the 4.29.x train\n - 4.28.6.1M and below releases in the 4.28.x train\n - 4.27.9M and below releases in the 4.27.x train\n - 4.26.9M and below releases in the 4.26.x train\n - 4.25.10M and below releases in the 4.25.x train" } ], "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2023-24510", "datePublished": "2023-06-05T00:00:00", "dateReserved": "2023-01-24T00:00:00", "dateUpdated": "2025-01-08T17:46:55.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28510
Vulnerability from cvelistv5
Published
2023-01-24 00:00
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Arista Networks | EOS |
Version: 4.22 Version: 4.27.1 < Version: 4.26.4 < Version: 4.25.6 < Version: 4.24.8 < Version: 4.23.10 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:32.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EOS", "vendor": "Arista Networks", "versions": [ { "status": "affected", "version": "4.22" }, { "lessThanOrEqual": "4.27.0", "status": "affected", "version": "4.27.1", "versionType": "custom" }, { "lessThanOrEqual": "4.26.0", "status": "affected", "version": "4.26.4", "versionType": "custom" }, { "lessThanOrEqual": "4.25.0", "status": "affected", "version": "4.25.6", "versionType": "custom" }, { "lessThanOrEqual": "4.24.0", "status": "affected", "version": "4.24.8", "versionType": "custom" }, { "lessThanOrEqual": "4.23.0", "status": "affected", "version": "4.23.10", "versionType": "custom" } ] } ], "datePublic": "2022-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-24T00:00:00", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076" } ], "solutions": [ { "lang": "en", "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2021-28510 has been fixed in the following releases:\n4.27.2 and later releases in the 4.27.x train\n4.26.5 and later releases in the 4.26.x train\n4.25.7 and later releases in the 4.25.x train\n4.24.9 and later releases in the 4.24.x train\n4.23.11 and later releases in the 4.23.x train\n" }, { "lang": "en", "value": "Hotfix\n\nThe following hotfix can be applied to remediate CVE-2021-28510\nNote: Installing/uninstalling the SWIX will cause the PTP agent to restart.\n\nVersion: 1.0\nURL:SecurityAdvisory76_CVE-2021-28510_Hotfix.swix\n\nSWIX hash: (SHA-512)2b78b8274b7c73083775b0327e13819c655db07e22b80038bb3843002c679a798b53a4638c549a86183e01a835377bf262d27e60020a39516a5d215e2fadb437 " } ], "source": { "advisory": "76", "defect": [ "BUG", "638107" ], "discovery": "INTERNAL" }, "title": "For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.", "workarounds": [ { "lang": "en", "value": "Install ACL rules to drop PTP packets from untrusted sources. Best practice is to block access to untrusted (non-management) networks." } ], "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28510", "datePublished": "2023-01-24T00:00:00", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:32.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-14810
Vulnerability from cvelistv5
Published
2019-10-10 18:07
Modified
2024-08-05 00:26
Severity ?
EPSS score ?
Summary
A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices | x_refsource_MISC | |
https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:26:39.049Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-10T18:07:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-14810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been found in the implementation of the Label Distribution Protocol (LDP) protocol in EOS. Under race conditions, the LDP agent can establish an LDP session with a malicious peer potentially allowing the possibility of a Denial of Service (DoS) attack on route updates and in turn potentially leading to an Out of Memory (OOM) condition that is disruptive to traffic forwarding. Affected EOS versions include: 4.22 release train: 4.22.1F and earlier releases 4.21 release train: 4.21.0F - 4.21.2.3F, 4.21.3F - 4.21.7.1M 4.20 release train: 4.20.14M and earlier releases 4.19 release train: 4.19.12M and earlier releases End of support release trains (4.18 and 4.17)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42", "refsource": "CONFIRM", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/8321-security-advisory-42" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-14810", "datePublished": "2019-10-10T18:07:51", "dateReserved": "2019-08-10T00:00:00", "dateUpdated": "2024-08-05T00:26:39.049Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }