Vulnerabilites related to Arista - Metamako Operating System
cve-2021-28493
Vulnerability from cvelistv5
Published
2021-09-09 12:45
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, a user may be able to execute commands despite not having the privileges to do so. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.32.0 and prior releases
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12915-security-advisory-67 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Arista | Metamako Operating System |
Version: MOS-0.33.0 < MOS-0.33.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:31.828Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12915-security-advisory-67" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Arista 7130 Systems running MOS" ], "product": "Metamako Operating System", "vendor": "Arista", "versions": [ { "lessThan": "MOS-0.33.0", "status": "affected", "version": "MOS-0.33.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, a user may be able to execute commands despite not having the privileges to do so. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.32.0 and prior releases" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-09T12:45:32", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12915-security-advisory-67" } ], "solutions": [ { "lang": "en", "value": "Upgrade to MOS-0.33.0\n" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@arista.com", "ID": "CVE-2021-28493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metamako Operating System", "version": { "version_data": [ { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.33.0", "version_value": "MOS-0.33.0" } ] } } ] }, "vendor_name": "Arista" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, a user may be able to execute commands despite not having the privileges to do so. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.32.0 and prior releases" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287 Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12915-security-advisory-67", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12915-security-advisory-67" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to MOS-0.33.0\n" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28493", "datePublished": "2021-09-09T12:45:32", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:31.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28495
Vulnerability from cvelistv5
Published
2021-09-09 12:43
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Arista | Metamako Operating System |
Version: MOS-0.13 < MOS-0.13* Version: MOS-0.26.7 < MOS-0.26.7 Version: MOS-0.32.0 < MOS-0.32.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:32.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Arista 7130 Systems running MOS" ], "product": "Metamako Operating System", "vendor": "Arista", "versions": [ { "lessThan": "MOS-0.13*", "status": "affected", "version": "MOS-0.13", "versionType": "custom" }, { "lessThan": "MOS-0.26.7", "status": "affected", "version": "MOS-0.26.7", "versionType": "custom" }, { "lessThan": "MOS-0.32.0", "status": "affected", "version": "MOS-0.32.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-09T12:43:57", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66" } ], "solutions": [ { "lang": "en", "value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@arista.com", "ID": "CVE-2021-28495", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metamako Operating System", "version": { "version_data": [ { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003e=", "version_name": "MOS-0.13", "version_value": "MOS-0.13" }, { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.26.7", "version_value": "MOS-0.26.7" }, { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.32.0", "version_value": "MOS-0.32.0" } ] } } ] }, "vendor_name": "Arista" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287 Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28495", "datePublished": "2021-09-09T12:43:57", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:32.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28497
Vulnerability from cvelistv5
Published
2021-09-09 12:41
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, the bash shell might be accessible to unprivileged users in situations where they should not have access. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12913-security-advisory-65 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Arista | Metamako Operating System |
Version: MOS-0.26.7 < MOS-0.16.7 Version: MOS-0.32.0 < MOS-0.32.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:32.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12913-security-advisory-65" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Arista 7130 Systems running MOS" ], "product": "Metamako Operating System", "vendor": "Arista", "versions": [ { "lessThan": "MOS-0.16.7", "status": "affected", "version": "MOS-0.26.7", "versionType": "custom" }, { "lessThan": "MOS-0.32.0", "status": "affected", "version": "MOS-0.32.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, the bash shell might be accessible to unprivileged users in situations where they should not have access. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-09T12:41:37", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12913-security-advisory-65" } ], "solutions": [ { "lang": "en", "value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@arista.com", "ID": "CVE-2021-28497", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metamako Operating System", "version": { "version_data": [ { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.26.7", "version_value": "MOS-0.16.7" }, { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.32.0", "version_value": "MOS-0.32.0" } ] } } ] }, "vendor_name": "Arista" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, the bash shell might be accessible to unprivileged users in situations where they should not have access. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264 Permissions, Privileges, and Access Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12913-security-advisory-65", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12913-security-advisory-65" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28497", "datePublished": "2021-09-09T12:41:37", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:32.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28499
Vulnerability from cvelistv5
Published
2021-09-09 12:38
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user account passwords set in clear text could leak to users without any password. This issue affects: Arista Metamako Operating System MOS-0.18 and post releases in the MOS-0.1x train All releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Arista | Metamako Operating System |
Version: MOS-0.18 < MOS-0.18* Version: MOS-0.32.0 < MOS-0.32.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:32.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Arista 7130 Systems running MOS" ], "product": "Metamako Operating System", "vendor": "Arista", "versions": [ { "lessThan": "MOS-0.18*", "status": "affected", "version": "MOS-0.18", "versionType": "custom" }, { "lessThan": "MOS-0.32.0", "status": "affected", "version": "MOS-0.32.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, user account passwords set in clear text could leak to users without any password. This issue affects: Arista Metamako Operating System MOS-0.18 and post releases in the MOS-0.1x train All releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-255", "description": "CWE-255 Credentials Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-09T12:38:50", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "solutions": [ { "lang": "en", "value": "Upgrade to MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@arista.com", "ID": "CVE-2021-28499", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metamako Operating System", "version": { "version_data": [ { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003e=", "version_name": "MOS-0.18", "version_value": "MOS-0.18" }, { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.32.0", "version_value": "MOS-0.32.0" } ] } } ] }, "vendor_name": "Arista" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, user account passwords set in clear text could leak to users without any password. This issue affects: Arista Metamako Operating System MOS-0.18 and post releases in the MOS-0.1x train All releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-255 Credentials Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28499", "datePublished": "2021-09-09T12:38:50", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:32.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28498
Vulnerability from cvelistv5
Published
2021-09-09 12:38
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Arista | Metamako Operating System |
Version: MOS-0.13 < MOS-0.13* Version: MOS-0.26.7 < MOS-0.26.7 Version: MOS-0.32.0 < MOS-0.32.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:32.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Arista 7130 Systems running MOS" ], "product": "Metamako Operating System", "vendor": "Arista", "versions": [ { "lessThan": "MOS-0.13*", "status": "affected", "version": "MOS-0.13", "versionType": "custom" }, { "lessThan": "MOS-0.26.7", "status": "affected", "version": "MOS-0.26.7", "versionType": "custom" }, { "lessThan": "MOS-0.32.0", "status": "affected", "version": "MOS-0.32.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-255", "description": "CWE-255 Credentials Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-09T12:38:21", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "solutions": [ { "lang": "en", "value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@arista.com", "ID": "CVE-2021-28498", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metamako Operating System", "version": { "version_data": [ { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003e=", "version_name": "MOS-0.13", "version_value": "MOS-0.13" }, { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.26.7", "version_value": "MOS-0.26.7" }, { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.32.0", "version_value": "MOS-0.32.0" } ] } } ] }, "vendor_name": "Arista" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-255 Credentials Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n" }, { "lang": "en", "value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28498", "datePublished": "2021-09-09T12:38:21", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:32.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-28494
Vulnerability from cvelistv5
Published
2021-09-09 12:46
Modified
2024-08-03 21:47
Severity ?
EPSS score ?
Summary
In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, authentication is bypassed by unprivileged users who are accessing the Web UI. This issue affects: Arista Metamako Operating System MOS-0.34.0 and prior releases
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12916-security-advisory-68 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Arista | Metamako Operating System |
Version: MOS-0.35.0 < MOS-0.35.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:31.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12916-security-advisory-68" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Arista 7130 Systems running MOS" ], "product": "Metamako Operating System", "vendor": "Arista", "versions": [ { "lessThan": "MOS-0.35.0", "status": "affected", "version": "MOS-0.35.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, authentication is bypassed by unprivileged users who are accessing the Web UI. This issue affects: Arista Metamako Operating System MOS-0.34.0 and prior releases" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-09T12:46:58", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12916-security-advisory-68" } ], "solutions": [ { "lang": "en", "value": "Upgrade to MOS-0.35.0\n" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@arista.com", "ID": "CVE-2021-28494", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Metamako Operating System", "version": { "version_data": [ { "platform": "Arista 7130 Systems running MOS", "version_affected": "\u003c", "version_name": "MOS-0.35.0", "version_value": "MOS-0.35.0" } ] } } ] }, "vendor_name": "Arista" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Arista\u0027s MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, authentication is bypassed by unprivileged users who are accessing the Web UI. This issue affects: Arista Metamako Operating System MOS-0.34.0 and prior releases" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287 Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12916-security-advisory-68", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12916-security-advisory-68" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to MOS-0.35.0\n" } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28494", "datePublished": "2021-09-09T12:46:58", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:31.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }