All the vulnerabilites related to arista - 7324x
cve-2020-26569
Vulnerability from cvelistv5
Published
2020-12-28 15:52
Modified
2024-08-04 15:56
Severity ?
Summary
In EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:56:04.942Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-28T15:52:48",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-26569",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57",
              "refsource": "CONFIRM",
              "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-26569",
    "datePublished": "2020-12-28T15:52:48",
    "dateReserved": "2020-10-06T00:00:00",
    "dateUpdated": "2024-08-04T15:56:04.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-24509
Vulnerability from cvelistv5
Published
2023-04-13 00:00
Modified
2024-08-02 10:56
Severity ?
Summary
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:56:04.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Arista EOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "status": "affected",
              "version": "4.23.0 4.23.13M"
            },
            {
              "lessThanOrEqual": "4.28.3M",
              "status": "affected",
              "version": "4.28.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.27.6M",
              "status": "affected",
              "version": "4.27.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.26.8M",
              "status": "affected",
              "version": "4.286.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.25.9M",
              "status": "affected",
              "version": "4.25.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.24.10M",
              "status": "affected",
              "version": "4.24.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24509, the following conditions must be met:\n\nTwo supervisor modules must both be inserted and active. To determine the status of the supervisor modules,\n\nswitch#show module \nModule  Ports Card Type                Model            Serial No.\n------- ----- ------------------------ ---------------- -----------\n1       3     DCS-7500-SUP2 Supervisor DCS-7500-SUP2    SSJ17133450\n2       2     Standby supervisor       DCS-7500-SUP2    SSJ17133441\n \nModule  Status  Uptime  Power off reason\n------- ------- ------- ----------------\n1       Active  0:24:58 N/A\n2       Standby 0:24:58 N/A\nSupervisor redundancy protocol must be configured with RPR(Route Processor Redundancy) or SSO (Stateful Switchover) on the switch. To determine the state and the current redundancy protocol of both supervisors on the switch,\n\nswitch#show redundancy status\n  my state = ACTIVE\npeer state = STANDBY WARM\n      Unit = Primary\n   Unit ID = 1\n   \nRedundancy Protocol (Operational) = Route Processor Redundancy\nRedundancy Protocol (Configured) = Route Processor Redundancy\nCommunications = Up\nReady for switchover\n   \n  Last switchover time = 7:23:56 ago\nLast switchover reason = Supervisor has control of the active supervisor lock"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Arista would like to acknowledge and thank Marc-Andr\u00e9 Labont\u00e9, Senior Information Security Analyst at Desjardins for responsibly reporting CVE-2023-24509."
        }
      ],
      "datePublic": "2023-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-13T00:00:00",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-24509 has been fixed in the following releases:\n\n4.28.4M and later releases in the 4.28.x train\n4.27.7M and later releases in the 4.27.x train\n4.26.9M and later releases in the 4.26.x train\n4.25.10M and later releases in the 4.25.x train\n4.24.11M and later releases in the 4.24.x train"
        },
        {
          "lang": "en",
          "value": "The following hotfix can be applied to remediate CVE-2023-24509. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above).: \n\n4.28.3M and below releases in the 4.28.x train\n4.27.6M and below releases in the 4.27.x train\n4.26.8M and below releases in the 4.26.x train\n4.25.9M and below releases in the 4.25.x train\n4.24.10M\n4.23.13M\nNote: Installing/uninstalling the SWIX will cause ConfigAgent to restart and disconnect existing CLI sessions.\n\nVersion: 1.0\n\nURL: SecurityAdvisory82_CVE-2023-24509_Hotfix.swix\n\nSWIX hash:\n\n(SHA-512)7833ab99e11cfea1ec28c09aedffd062cfc865a20a843ee6184caff1081e748c8a02590644d0c7b0e377027379cbaadc8b1a70d1c37097bf98c1bedb429dca56"
        }
      ],
      "source": {
        "advisory": "82",
        "defect": [
          "723401"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading t ...",
      "workarounds": [
        {
          "lang": "en",
          "value": "The workaround is to disable \u201cssh\u201d CLI command in unprivileged mode on the SSH client devices by using command authorization. This can be done with Role-Based Access Control (RBAC).\n\nIf the \u201cssh\u201d CLI command is currently used to connect to a remote host, the destination address can be added to an allowlist with RBAC."
        }
      ],
      "x_ConverterErrors": {
        "TITLE": {
          "error": "TITLE too long. Truncating in v5 record.",
          "message": "Truncated!"
        }
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24509",
    "datePublished": "2023-04-13T00:00:00",
    "dateReserved": "2023-01-24T00:00:00",
    "dateUpdated": "2024-08-02T10:56:04.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-15898
Vulnerability from cvelistv5
Published
2020-12-28 18:16
Modified
2024-08-04 13:30
Severity ?
Summary
In Arista EOS malformed packets can be incorrectly forwarded across VLAN boundaries in one direction. This vulnerability is only susceptible to exploitation by unidirectional traffic (ex. UDP) and not bidirectional traffic (ex. TCP). This affects: EOS 7170 platforms version 4.21.4.1F and below releases in the 4.21.x train; EOS X-Series versions 4.21.11M and below releases in the 4.21.x train; 4.22.6M and below releases in the 4.22.x train; 4.23.4M and below releases in the 4.23.x train; 4.24.2.1F and below releases in the 4.24.x train.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:30:23.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11996-security-advisory-56"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Arista EOS malformed packets can be incorrectly forwarded across VLAN boundaries in one direction. This vulnerability is only susceptible to exploitation by unidirectional traffic (ex. UDP) and not bidirectional traffic (ex. TCP). This affects: EOS 7170 platforms version 4.21.4.1F and below releases in the 4.21.x train; EOS X-Series versions 4.21.11M and below releases in the 4.21.x train; 4.22.6M and below releases in the 4.22.x train; 4.23.4M and below releases in the 4.23.x train; 4.24.2.1F and below releases in the 4.24.x train."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-28T18:16:58",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11996-security-advisory-56"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-15898",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Arista EOS malformed packets can be incorrectly forwarded across VLAN boundaries in one direction. This vulnerability is only susceptible to exploitation by unidirectional traffic (ex. UDP) and not bidirectional traffic (ex. TCP). This affects: EOS 7170 platforms version 4.21.4.1F and below releases in the 4.21.x train; EOS X-Series versions 4.21.11M and below releases in the 4.21.x train; 4.22.6M and below releases in the 4.22.x train; 4.23.4M and below releases in the 4.23.x train; 4.24.2.1F and below releases in the 4.24.x train."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/11996-security-advisory-56",
              "refsource": "CONFIRM",
              "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11996-security-advisory-56"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15898",
    "datePublished": "2020-12-28T18:16:58",
    "dateReserved": "2020-07-22T00:00:00",
    "dateUpdated": "2024-08-04T13:30:23.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-28510
Vulnerability from cvelistv5
Published
2023-01-24 00:00
Modified
2024-08-03 21:47
Summary
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T21:47:32.671Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "status": "affected",
              "version": "4.22"
            },
            {
              "lessThanOrEqual": "4.27.0",
              "status": "affected",
              "version": "4.27.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.26.0",
              "status": "affected",
              "version": "4.26.4",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.25.0",
              "status": "affected",
              "version": "4.25.6",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.24.0",
              "status": "affected",
              "version": "4.24.8",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.23.0",
              "status": "affected",
              "version": "4.23.10",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-04-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-24T00:00:00",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2021-28510 has been fixed in the following releases:\n4.27.2 and later releases in the 4.27.x train\n4.26.5 and later releases in the 4.26.x train\n4.25.7 and later releases in the 4.25.x train\n4.24.9 and later releases in the 4.24.x train\n4.23.11 and later releases in the 4.23.x train\n"
        },
        {
          "lang": "en",
          "value": "Hotfix\n\nThe following hotfix can be applied to remediate CVE-2021-28510\nNote: Installing/uninstalling the SWIX will cause the PTP agent to restart.\n\nVersion: 1.0\nURL:SecurityAdvisory76_CVE-2021-28510_Hotfix.swix\n\nSWIX hash: (SHA-512)2b78b8274b7c73083775b0327e13819c655db07e22b80038bb3843002c679a798b53a4638c549a86183e01a835377bf262d27e60020a39516a5d215e2fadb437 "
        }
      ],
      "source": {
        "advisory": "76",
        "defect": [
          "BUG",
          "638107"
        ],
        "discovery": "INTERNAL"
      },
      "title": "For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.",
      "workarounds": [
        {
          "lang": "en",
          "value": "Install ACL rules to drop PTP packets from untrusted sources. Best practice is to block access to untrusted (non-management) networks."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2021-28510",
    "datePublished": "2023-01-24T00:00:00",
    "dateReserved": "2021-03-16T00:00:00",
    "dateUpdated": "2024-08-03T21:47:32.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2020-12-28 16:15
Modified
2024-11-21 05:20
Summary
In EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F78A5196-C732-490D-96C8-EECC3D1D5864",
              "versionEndIncluding": "4.21.12m",
              "versionStartIncluding": "4.21.0f",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE443F7-EDE6-421C-A898-4CC045C29344",
              "versionEndIncluding": "4.22.7m",
              "versionStartIncluding": "4.22.0f",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "562677FC-A1E6-4C29-995F-7FB833869FBE",
              "versionEndIncluding": "4.23.5m",
              "versionStartIncluding": "4.23.0f",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BF634C-E2E7-4982-BCA2-56BCDC37495E",
              "versionEndIncluding": "4.24.2f",
              "versionStartIncluding": "4.24.0f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:7010t-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCF6152-815E-4B3C-AE4B-CA598BEBD020",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BAE58E-F4B5-4C8F-9EEB-5A0F38A96F0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FE473B-CA6E-4E8D-8DBF-676B1ECBB185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7308x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1EF943-154C-4B5B-B803-E186FEA8C5A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8862F74-E399-41EE-A081-62D99A7C1755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F16261D-639F-4CAB-BDA6-EF3F277E663C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train."
    },
    {
      "lang": "es",
      "value": "En unas configuraciones EVPN VxLAN en Arista EOS, los paquetes malformados espec\u00edficos pueden conllevar a enlaces incorrectos de MAC a IP y, como resultado, los paquetes pueden ser reenviados incorrectamente a trav\u00e9s de los l\u00edmites de la VLAN.\u0026#xa0;Esto puede causar que el tr\u00e1fico se descarte en la VLAN receptora.\u0026#xa0;Esto afecta a las versiones: 4.21.12M y versiones inferiores en el tren 4.21.x;\u0026#xa0;4.22.7M y versiones inferiores en el tren 4.22.x;\u0026#xa0;4.23.5M y versiones inferiores en el tren 4.23.x;\u0026#xa0;4.24.2F y versiones inferiores en el tren 4.24.x"
    }
  ],
  "id": "CVE-2020-26569",
  "lastModified": "2024-11-21T05:20:06.097",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-28T16:15:12.870",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11997-security-advisory-57"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-26 21:15
Modified
2024-11-21 05:59
Summary
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
Impacted products
Vendor Product Version
arista eos *
arista eos *
arista eos *
arista eos *
arista eos *
arista 7020r -
arista 7050cx3-32s -
arista 7050cx3m-32s -
arista 7050qx-32s -
arista 7050qx2-32s -
arista 7050sx-128 -
arista 7050sx-64 -
arista 7050sx-72q -
arista 7050sx2-128 -
arista 7050sx2-72q -
arista 7050sx3-48c8 -
arista 7050sx3-48yc -
arista 7050sx3-48yc12 -
arista 7050sx3-48yc8 -
arista 7050sx3-96yc8 -
arista 7050tx-48 -
arista 7050tx-64 -
arista 7050tx-72q -
arista 7050tx2-128 -
arista 7050tx3-48c8 -
arista 7060cx-32s -
arista 7060cx2-32s -
arista 7060dx4-32 -
arista 7060px4-32 -
arista 7060sx2-48yc6 -
arista 7150s-24 -
arista 7150s-52 -
arista 7150s-64 -
arista 7150sc-24 -
arista 7150sc-64 -
arista 7170-32c -
arista 7170-32cd -
arista 7170-64c -
arista 720xp-24y6 -
arista 720xp-24zy4 -
arista 720xp-48y6 -
arista 720xp-48zc2 -
arista 720xp-96zc2 -
arista 7250qx-64 -
arista 7260cx -
arista 7260cx3 -
arista 7260cx3-64 -
arista 7260qx -
arista 7280e -
arista 7280r -
arista 7280r2 -
arista 7280r3 -
arista 7280sr3-48yc8 -
arista 7280sr3k-48yc8 -
arista 7300x-32q -
arista 7300x-64s -
arista 7300x-64t -
arista 7300x3-32c -
arista 7300x3-48yc4 -
arista 7304x3 -
arista 7308x3 -
arista 7320x-32c -
arista 7324x -
arista 7328x -
arista 7368x4 -
arista 7500e -
arista 7500r -
arista 7500r2 -
arista 7500r3 -
arista 7500r3-24d -
arista 7500r3-24p -
arista 7500r3-36cq -
arista 7500r3k-36cq -
arista 7504r3 -
arista 7508r3 -
arista 7512r3 -
arista 7800r3-36p -
arista 7800r3-48cq -
arista 7800r3k-48cq -
arista 7804r3 -
arista 7808r3 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1978B5F4-4405-4E7C-B0A9-45FF6FBBC1DA",
              "versionEndExcluding": "4.23.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C68E33-DDB0-473A-BCEA-0769924F3F8D",
              "versionEndExcluding": "4.24.8",
              "versionStartIncluding": "4.24.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3649E5-79A3-4A34-8EB8-31B8F40753F2",
              "versionEndExcluding": "4.25.6",
              "versionStartIncluding": "4.25.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFC4A4F-A4A6-4C0A-A144-9635F5DBC972",
              "versionEndExcluding": "4.26.4",
              "versionStartIncluding": "4.26.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60DB1F59-64F8-4EC0-8C56-2AB5E2316CEA",
              "versionEndExcluding": "4.27.1",
              "versionStartIncluding": "4.27.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:7020r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3371EEF-9D7A-4EF6-A435-A0F1034E5EE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93D74C0B-E470-4D45-98E2-775DE43997DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2CAA23-003C-43E6-87CE-61E4369C2D30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7445075-D130-472C-B259-6BACE678541D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3FA52A-3A67-4515-9790-598860102893",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6336F166-FAD3-4846-84B9-45F5FAA3D437",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EFEEA5-0FC4-4FFC-BF5D-BDBAA1B55C70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2959C68-8731-4F37-B9E7-61E5936D3D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6FB3395-8D13-4477-A46E-37A88272CFAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BAE58E-F4B5-4C8F-9EEB-5A0F38A96F0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6466FE3-DCE8-4DA5-B893-2BA864F73BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C02B50F5-B316-4081-BC9E-6F1778049096",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21CB1AAF-FC82-4A80-9932-42E8EFA3906A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60FC964C-9835-443A-A584-3A5D6022E914",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8143579F-AD53-4D74-AE3E-4D465DCD7A57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280sr3k-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB0F1D-ACCA-490C-96F2-FC23A8611CB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FE473B-CA6E-4E8D-8DBF-676B1ECBB185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7308x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1EF943-154C-4B5B-B803-E186FEA8C5A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8862F74-E399-41EE-A081-62D99A7C1755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F16261D-639F-4CAB-BDA6-EF3F277E663C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C61DCC-D1CF-4CE5-9634-4BE3E071E83E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC651584-113E-4859-9F14-12D62F3BD626",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "583725F6-8583-425C-A847-700DBB9169E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C6A4B3C-FF12-4DCD-9945-8450AD0BDEED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1BB565-2668-4242-8A00-5CC9C30B9AC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F1A605-8836-4A64-AC5E-ADAB34F8F104",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8A047A-9FD9-4AE1-9E47-457A46BAE3A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "019B0670-389B-4A4E-8C72-52202E3AA8EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8387CCEA-F00C-4F1F-B966-ACF8B16F1D22",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7508r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AE2A1C-A4FD-423B-A77E-2E24C2310A6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7512r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B0D708-B426-4CA1-BE87-08BD14B7EACE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D19E86BF-AA91-4262-8EF9-B7FC48C6F3F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58443CDE-33D8-4460-A861-CDC07431AA22",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BE8C68-FE98-4162-A3D3-54494D5444F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7804r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A54F3D32-5A07-4791-90BF-96BD8A24C2F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F078B04-2DA0-4A4B-BB1A-408DC14CB61F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable."
    },
    {
      "lang": "es",
      "value": "Para ciertos sistemas que ejecutan EOS, un paquete de protocolo de tiempo de precisi\u00f3n (PTP) de un mensaje de administraci\u00f3n/se\u00f1alizaci\u00f3n con un valor de tipo, longitud y valor (TLV) no v\u00e1lido hace que el agente PTP se reinicie. Los reinicios repetidos del servicio har\u00e1n que el servicio no est\u00e9 disponible."
    }
  ],
  "id": "CVE-2021-28510",
  "lastModified": "2024-11-21T05:59:48.603",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "psirt@arista.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-01-26T21:15:22.147",
  "references": [
    {
      "source": "psirt@arista.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076"
    }
  ],
  "sourceIdentifier": "psirt@arista.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "psirt@arista.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-04-13 20:15
Modified
2024-11-21 07:48
Summary
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "498704F8-24D4-48C9-A5CB-4A8F7054AA49",
              "versionEndIncluding": "4.23.13m",
              "versionStartIncluding": "4.23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8923F137-B1BA-49FF-A100-AD357966EE4F",
              "versionEndExcluding": "4.24.11m",
              "versionStartIncluding": "4.24.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6EA8CE-BAA4-4B4D-8A9F-A65018FC6B3A",
              "versionEndExcluding": "4.25.10m",
              "versionStartIncluding": "4.25.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "659190E5-DFB0-4172-BD6F-1B9E22533CE5",
              "versionEndExcluding": "4.26.9m",
              "versionStartIncluding": "4.26.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "20966F67-1C70-458C-A4EF-02612345DE48",
              "versionEndExcluding": "4.27.7m",
              "versionStartIncluding": "4.27.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F57FAA3-518C-498C-9580-19A207C8F176",
              "versionEndExcluding": "4.28.4m",
              "versionStartIncluding": "4.28.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:704x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C0C33F-72A7-41CA-A666-1CEC9F0FE02F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7304x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C6E0C9-7F81-4CE3-BD46-7939667E5969",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FE473B-CA6E-4E8D-8DBF-676B1ECBB185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7308x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7A8ABF1-ADF4-474D-B01B-8BB271E1263E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7316x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73ECE6D6-12E5-4396-9C19-3B2E08E13147",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8862F74-E399-41EE-A081-62D99A7C1755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F16261D-639F-4CAB-BDA6-EF3F277E663C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7504r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1F369D-93BF-4259-99F5-97FBEF79BBA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8387CCEA-F00C-4F1F-B966-ACF8B16F1D22",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7508r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F35978B6-889C-47DB-971B-B2A12FF537E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7508r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AE2A1C-A4FD-423B-A77E-2E24C2310A6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7512r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2360E039-5F12-4210-8578-7EBDA4575A6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7512r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B0D708-B426-4CA1-BE87-08BD14B7EACE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7516r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D45E5E5-7EB9-41E7-8EEE-570E6646EDDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:755x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "585E3617-2B1F-4E58-853A-0E9703B91B80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:758x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B1D90C-73CC-49A2-B202-B07D96226729",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7804r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A54F3D32-5A07-4791-90BF-96BD8A24C2F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F078B04-2DA0-4A4B-BB1A-408DC14CB61F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7812r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B99200-EC76-404E-9900-5D1DC3B9A758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7816r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A172A49-1A0E-464B-BDDD-A8F52856D595",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability."
    }
  ],
  "id": "CVE-2023-24509",
  "lastModified": "2024-11-21T07:48:00.993",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 9.3,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 6.0,
        "source": "psirt@arista.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-04-13T20:15:08.843",
  "references": [
    {
      "source": "psirt@arista.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082"
    }
  ],
  "sourceIdentifier": "psirt@arista.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "psirt@arista.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-12-28 19:15
Modified
2024-11-21 05:06
Summary
In Arista EOS malformed packets can be incorrectly forwarded across VLAN boundaries in one direction. This vulnerability is only susceptible to exploitation by unidirectional traffic (ex. UDP) and not bidirectional traffic (ex. TCP). This affects: EOS 7170 platforms version 4.21.4.1F and below releases in the 4.21.x train; EOS X-Series versions 4.21.11M and below releases in the 4.21.x train; 4.22.6M and below releases in the 4.22.x train; 4.23.4M and below releases in the 4.23.x train; 4.24.2.1F and below releases in the 4.24.x train.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74FB457-3B38-49B2-80A7-A0541BAAFBD7",
              "versionEndIncluding": "4.21.4.1f",
              "versionStartIncluding": "4.21.0f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EFEEA5-0FC4-4FFC-BF5D-BDBAA1B55C70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2959C68-8731-4F37-B9E7-61E5936D3D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6FB3395-8D13-4477-A46E-37A88272CFAB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F0F53EB-B0DE-42AB-A9F9-FFBAFC5F223A",
              "versionEndIncluding": "4.21.11m",
              "versionStartIncluding": "4.21.0f",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "188A9EBD-1DD4-4111-A66D-67C0A0035662",
              "versionEndIncluding": "4.22.6m",
              "versionStartIncluding": "4.22.0f",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F80FCF7B-38CD-43B5-82EE-139A0D249D70",
              "versionEndIncluding": "4.23.4m",
              "versionStartIncluding": "4.23.0f",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B2F63-75D5-4C8A-BAD3-CDFE1A31CE48",
              "versionEndIncluding": "4.24.2.1f",
              "versionStartIncluding": "4.24.0f",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BAE58E-F4B5-4C8F-9EEB-5A0F38A96F0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FE473B-CA6E-4E8D-8DBF-676B1ECBB185",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7308x3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1EF943-154C-4B5B-B803-E186FEA8C5A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8862F74-E399-41EE-A081-62D99A7C1755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F16261D-639F-4CAB-BDA6-EF3F277E663C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Arista EOS malformed packets can be incorrectly forwarded across VLAN boundaries in one direction. This vulnerability is only susceptible to exploitation by unidirectional traffic (ex. UDP) and not bidirectional traffic (ex. TCP). This affects: EOS 7170 platforms version 4.21.4.1F and below releases in the 4.21.x train; EOS X-Series versions 4.21.11M and below releases in the 4.21.x train; 4.22.6M and below releases in the 4.22.x train; 4.23.4M and below releases in the 4.23.x train; 4.24.2.1F and below releases in the 4.24.x train."
    },
    {
      "lang": "es",
      "value": "En Arista EOS, los paquetes malformados pueden ser incorrectamente reenviados a trav\u00e9s de los l\u00edmites de la VLAN en una direcci\u00f3n.\u0026#xa0;Esta vulnerabilidad solo es susceptible de explotaci\u00f3n por tr\u00e1fico unidireccional (por ejemplo, UDP) y no por tr\u00e1fico bidireccional (por ejemplo, TCP).\u0026#xa0;Esto afecta a: plataformas EOS 7170 versi\u00f3n 4.21.4.1F y versiones por debajo en el tren 4.21.x;\u0026#xa0;EOS X-Series versiones 4.21.11M y versiones por debajo en el tren 4.21.x;\u0026#xa0;4.22.6M y versiones por debajo en el tren 4.22.x;\u0026#xa0;4.23.4M y versiones por debajo en el tren 4.23.x;\u0026#xa0;4.24.2.1F y versiones por debajo en el tren 4.24.x"
    }
  ],
  "id": "CVE-2020-15898",
  "lastModified": "2024-11-21T05:06:24.367",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-28T19:15:12.783",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11996-security-advisory-56"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11996-security-advisory-56"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}