Search criteria

12 vulnerabilities found for cloudeos by arista

FKIE_CVE-2023-24512

Vulnerability from fkie_nvd - Published: 2023-04-25 21:15 - Updated: 2024-11-21 07:48
Summary
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
Impacted products
Vendor Product Version
arista eos *
arista eos *
arista eos *
arista eos *
arista 32qd -
arista 48ehs -
arista 48lbas -
arista 48lbs -
arista 48s6qd -
arista 7010t-48 -
arista 7020sr-24c2 -
arista 7020sr-32c2 -
arista 7020tr-48 -
arista 7020tra-48 -
arista 7050cx3-32s -
arista 7050cx3m-32s -
arista 7050qx-32s -
arista 7050qx2-32s -
arista 7050sx-128 -
arista 7050sx-64 -
arista 7050sx-72q -
arista 7050sx2-128 -
arista 7050sx2-72q -
arista 7050sx3-48c8 -
arista 7050sx3-48yc -
arista 7050sx3-48yc12 -
arista 7050sx3-48yc8 -
arista 7050sx3-96yc8 -
arista 7050tx-48 -
arista 7050tx-64 -
arista 7050tx-72q -
arista 7050tx2-128 -
arista 7050tx3-48c8 -
arista 7060cx-32s -
arista 7060cx2-32s -
arista 7060dx4-32 -
arista 7060px4-32 -
arista 7060sx2-48yc6 -
arista 7130-16g3s -
arista 7130-48g3s -
arista 7130-96s -
arista 7150s-24 -
arista 7150s-52 -
arista 7150s-64 -
arista 7150sc-24 -
arista 7150sc-64 -
arista 7160-32cq -
arista 7160-48tc6 -
arista 7160-48yc6 -
arista 7170-32c -
arista 7170-32cd -
arista 7170-64c -
arista 7170b-64c -
arista 720df-48y -
arista 720dp-24s -
arista 720dp-48s -
arista 720dt-24s -
arista 720dt-48s -
arista 720xp-24y6 -
arista 720xp-24zy4 -
arista 720xp-48y6 -
arista 720xp-48zc2 -
arista 720xp-96zc2 -
arista 7250qx-64 -
arista 7260cx -
arista 7260cx3 -
arista 7260qx -
arista 7260sx2 -
arista 7280cr2k-60 -
arista 7280cr3-32d4 -
arista 7280cr3-32p4 -
arista 7280cr3-96 -
arista 7280cr3k-32d4 -
arista 7280cr3k-32p4 -
arista 7280cr3k-96 -
arista 7280dr3-24 -
arista 7280dr3k-24 -
arista 7280e -
arista 7280pr3-24 -
arista 7280pr3k-24 -
arista 7280sr3-48yc8 -
arista 7280sr3k-48yc8 -
arista 7300x-32q -
arista 7300x-64s -
arista 7300x-64t -
arista 7300x3-32c -
arista 7300x3-48yc4 -
arista 7320x-32c -
arista 7358x4 -
arista 7368x4 -
arista 7388x5 -
arista 7500r3-24d -
arista 7500r3-24p -
arista 7500r3-36cq -
arista 7500r3k-36cq -
arista 7804r3 -
arista 7808r3 -
arista 7812r3 -
arista 7816r3 -
arista 96lbs -
arista dcs-7010tx-48 -
arista dcs-7500-12cq-lc -
arista dcs-7500e-12cm-lc -
arista dcs-7500e-36q-lc -
arista dcs-7500e-48s-lc -
arista dcs-7500e-6c2-lc -
arista dcs-7500e-72s-lc -
arista dcs-7500r-36cq-lc -
arista dcs-7500r-36q-lc -
arista dcs-7500r-48s2cq-lc -
arista ceos-lab *
arista cloudeos -
arista veos-lab -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "341CA00E-8BDE-4BF9-90D4-7B07FC484D18",
              "versionEndExcluding": "4.26.10m",
              "versionStartIncluding": "4.26.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A7CEC1-C298-4AEE-A079-550167C2AA3A",
              "versionEndExcluding": "4.27.9m",
              "versionStartIncluding": "4.27.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32D876FE-C639-4870-A412-0239EA0155D0",
              "versionEndExcluding": "4.28.6m",
              "versionStartIncluding": "4.28.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24621B26-04A1-4693-BCB4-437544C08B50",
              "versionEndExcluding": "4.29.2f",
              "versionStartIncluding": "4.29.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:32qd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4184EB8C-5972-413F-A6CD-B1365D242B41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:48ehs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED3033F-6AFD-462B-BED4-032D84D41068",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:48lbas:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EDFE460-5163-4A86-BFDE-7F0FA8EC96D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:48lbs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C680AE5-0810-4A0C-9234-405F2A879F87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:48s6qd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38A296BD-4449-447C-AF27-F6C033C686D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7010t-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CCF6152-815E-4B3C-AE4B-CA598BEBD020",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7020sr-24c2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7781CB15-3452-47D9-A961-8B09F2E9AEC1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7020sr-32c2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09A31FB8-512E-43EF-8F87-E02E35F5251E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7020tr-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CBFF922-28D7-42D6-8796-91AD9A178D28",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7020tra-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "561B4042-DFD3-4BC0-9C5F-74799A7E92C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7130-16g3s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFA321D-F4A5-434C-BB39-D2B2687001D6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7130-48g3s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BE67B8-F326-48B7-AB82-04FE8C2E37E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7130-96s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3264E086-4E90-41D0-8583-8FCF3CE4885D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93D74C0B-E470-4D45-98E2-775DE43997DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2CAA23-003C-43E6-87CE-61E4369C2D30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7445075-D130-472C-B259-6BACE678541D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3FA52A-3A67-4515-9790-598860102893",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6336F166-FAD3-4846-84B9-45F5FAA3D437",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7160-32cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7620401C-FB14-46F1-979B-B21194F90945",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7160-48tc6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07DFC236-44B3-4EEF-8937-4F86EE99EB45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7160-48yc6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "823E5569-C918-40E6-A2C5-7C415E4ADEF5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EFEEA5-0FC4-4FFC-BF5D-BDBAA1B55C70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2959C68-8731-4F37-B9E7-61E5936D3D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6FB3395-8D13-4477-A46E-37A88272CFAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7170b-64c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EE3572E-A724-4057-8776-7A95528DCEE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720df-48y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FCDB83-38D5-4F02-97E2-BBEF891DCDD7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720dp-24s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EAF795-EB62-4A86-A0FC-A09008E631A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720dp-48s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA03BA0B-BB2D-41CF-BA2E-B21604D6FBC1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720dt-24s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE185FD-0D4D-4862-B513-BC68BF3F9F7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720dt-48s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C2150F-2FD6-452F-8C56-7413E3EB8FDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7260sx2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58296832-AA93-4EAE-96BD-28EC368F8391",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr2k-60:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F569286-C19F-48CB-AB24-89C4A1EB6F81",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr3-32d4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FEC18B3-7980-4EBF-8E15-F8E92DADD062",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr3-32p4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E85F7C-F33B-49C1-A526-ACC1BEF3B65C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr3-96:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E54F451-CA87-4F32-A088-AE18123CE07A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr3k-32d4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CB1780-6DEC-4140-A771-9139C77A8A88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr3k-32p4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11DE9CB6-4453-4EED-B7FC-6374F9225B83",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280cr3k-96:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A98C94CB-7DFC-4CAC-9D98-B3E80BF1EE56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280dr3-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D9E9FF-564E-4B16-8070-33A366F48FE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280dr3k-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56AF4A54-7568-4FE0-BE5F-02BD9FADDCE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6466FE3-DCE8-4DA5-B893-2BA864F73BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280pr3-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14163D2-B236-4C78-9DB4-97DE6D996EBC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280pr3k-24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4057906A-B27B-4B53-97F6-3F5F35794990",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8143579F-AD53-4D74-AE3E-4D465DCD7A57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7280sr3k-48yc8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB0F1D-ACCA-490C-96F2-FC23A8611CB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7358x4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC38094-A539-425D-A2B6-770FAF0FC3C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7388x5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B66E706E-56FB-4A49-BD90-76A8CB6BE391",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1BB565-2668-4242-8A00-5CC9C30B9AC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F1A605-8836-4A64-AC5E-ADAB34F8F104",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE8A047A-9FD9-4AE1-9E47-457A46BAE3A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "019B0670-389B-4A4E-8C72-52202E3AA8EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7804r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A54F3D32-5A07-4791-90BF-96BD8A24C2F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F078B04-2DA0-4A4B-BB1A-408DC14CB61F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7812r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B99200-EC76-404E-9900-5D1DC3B9A758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:7816r3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A172A49-1A0E-464B-BDDD-A8F52856D595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:96lbs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBAE5B17-52F9-4FDD-BD65-AA0C1ADB4806",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7010tx-48:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CB43CD4-C96F-483C-B743-3D81C9A65EDF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500-12cq-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCC3EC2-D68C-49E5-8E72-35F16853CA04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500e-12cm-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30D363C8-7D75-4EA7-B5BC-566C1C9ECE96",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500e-36q-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0CD14C-E2C8-4EEC-AAD9-E2428E8610DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500e-48s-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACD40F1C-32AA-42DF-9378-724CD949127B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500e-6c2-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB63C0B-D27A-4CB4-B379-570C0DC8B958",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500e-72s-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2468E734-5CA3-4293-A806-358FE659AEA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500r-36cq-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C4EAF7-6FD7-477A-B4BE-DE5920BF7BBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500r-36q-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA8BEE5-9EDC-4BAC-AB7C-4F9E6680388B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dcs-7500r-48s2cq-lc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB68705B-A8A5-49AB-AC53-02B311900F7D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arista:ceos-lab:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2260519E-FB90-4924-95E7-1FCC34C4B38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "362F2E0F-3D40-444F-87F3-21CA70B1AD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos-lab:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B29E15-3CFB-45EC-B252-8F02CC1E589C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision"
    }
  ],
  "id": "CVE-2023-24512",
  "lastModified": "2024-11-21T07:48:01.437",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "psirt@arista.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-04-25T21:15:10.190",
  "references": [
    {
      "source": "psirt@arista.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086"
    }
  ],
  "sourceIdentifier": "psirt@arista.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "psirt@arista.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-24545

Vulnerability from fkie_nvd - Published: 2023-04-12 21:15 - Updated: 2024-11-21 07:48
Summary
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D1A5002-07BD-4669-A7C9-E47A28C3F39C",
              "versionEndExcluding": "4.26.9m",
              "versionStartIncluding": "4.26.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FEF7B98-AD0E-4DE3-912D-DDC39FE4C3D7",
              "versionEndExcluding": "4.27.8m",
              "versionStartIncluding": "4.27.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA82CE8C-A95E-48B9-8E61-09429FFBC0DD",
              "versionEndExcluding": "4.28.5m",
              "versionStartIncluding": "4.28.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0769DED3-64E8-4EEC-95BD-CDB18C848B8E",
              "versionEndExcluding": "4.29.2f",
              "versionStartIncluding": "4.29.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:arista:dca-200-veos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9985E3-D496-473F-A806-022EC164EF96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic."
    }
  ],
  "id": "CVE-2023-24545",
  "lastModified": "2024-11-21T07:48:05.733",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "psirt@arista.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-04-12T21:15:18.183",
  "references": [
    {
      "source": "psirt@arista.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
    }
  ],
  "sourceIdentifier": "psirt@arista.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "psirt@arista.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-24513

Vulnerability from fkie_nvd - Published: 2023-04-12 20:15 - Updated: 2024-11-21 07:48
Summary
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DC93B2-147D-427E-89E5-0F8EC3D884B0",
              "versionEndExcluding": "4.26.9m",
              "versionStartIncluding": "4.26.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA01B5E-EDAB-4C30-9F2C-57C0ACB6EF02",
              "versionEndExcluding": "4.27.8m",
              "versionStartIncluding": "4.27.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60CFAB31-7E8C-49E0-BDB2-ED1EF62D9303",
              "versionEndExcluding": "4.28.5m",
              "versionStartIncluding": "4.28.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E98581C-4312-4EC2-A253-73D5179DDA6A",
              "versionEndExcluding": "4.29.2f",
              "versionStartIncluding": "4.29.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amazon:aws_marketplace:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38DF4A9E-F836-4389-BCE4-10E5121332E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:equinix:network_edge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BE13E07-E588-498B-892A-48AE52E222CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:google:google_cloud_platform_marketplace:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8139E4B-24C7-4C77-A375-088C6817256D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_marketplace:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B18F83F7-96C2-4B36-A68F-5B8C4E41D066",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:arista:dca-200-veos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C9985E3-D496-473F-A806-022EC164EF96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic."
    }
  ],
  "id": "CVE-2023-24513",
  "lastModified": "2024-11-21T07:48:01.593",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "psirt@arista.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-04-12T20:15:07.963",
  "references": [
    {
      "source": "psirt@arista.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
    }
  ],
  "sourceIdentifier": "psirt@arista.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-126"
        }
      ],
      "source": "psirt@arista.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-11622

Vulnerability from fkie_nvd - Published: 2020-06-10 20:15 - Updated: 2024-11-21 04:58
Summary
A vulnerability exists in Arista’s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured.
Impacted products
Vendor Product Version
arista cloudeos *
arista cloudeos *
arista cloudeos *
arista cloudeos 4.21.3fx-7368
arista cloudeos 4.21.4-fcrfx
arista cloudeos 4.21.4.1
arista cloudeos 4.21.7.1
arista cloudeos 4.22.2.0.1
arista cloudeos 4.22.2.2.1
arista cloudeos 4.22.3.1
arista cloudeos 4.23.2.1
arista veos *
arista veos *
arista veos *
arista veos 4.21.3fx-7368
arista veos 4.21.4-fcrfx
arista veos 4.21.4.1
arista veos 4.21.7.1
arista veos 4.22.2.0.1
arista veos 4.22.2.2.1
arista veos 4.22.3.1
arista veos 4.23.2.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D551EEF0-4216-492B-BFE0-D3D646C975AC",
              "versionEndIncluding": "4.21.9m",
              "versionStartIncluding": "4.21.3m",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "791E5CEC-AE25-49CA-BFF2-CD718DC27A5B",
              "versionEndIncluding": "4.22.4m",
              "versionStartIncluding": "4.22.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF13C82C-9207-476C-B25F-39B77128F8E5",
              "versionEndIncluding": "4.23.2m",
              "versionStartIncluding": "4.23.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.21.3fx-7368:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13B96E1-1A0B-4D14-BCE1-D2E4843747B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.21.4-fcrfx:*:*:*:*:*:*:*",
              "matchCriteriaId": "473A0E2D-C9FF-4B5B-9A20-82331D876945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.21.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0477187E-50AC-470F-BAE8-9E2699D7BA1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.21.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBF773D2-BD2E-4FFF-97EF-E6A6BD78B1A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.22.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1271EED-6536-4C63-B81C-4B78C38E60FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.22.2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55317FD4-B808-4035-8C3D-67C96C55D5ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.22.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA41E8C-B18F-4738-9764-1455F6D12670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:cloudeos:4.23.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8DC49B8-9CC1-4219-8CFB-5DBE83C6349F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DA14B6-DF76-4509-A9EB-5B28CDD86927",
              "versionEndIncluding": "4.21.9m",
              "versionStartIncluding": "4.21.3m",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D223445-DE06-480D-A06C-9E9E63BDBD72",
              "versionEndIncluding": "4.22.4m",
              "versionStartIncluding": "4.22.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79167BC-5EEF-4C91-8E7F-E142A26B4A2D",
              "versionEndIncluding": "4.23.2m",
              "versionStartIncluding": "4.23.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.21.3fx-7368:*:*:*:*:*:*:*",
              "matchCriteriaId": "19E505BF-3F7A-43FE-ADC5-2B0368924E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.21.4-fcrfx:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E75DB8-360E-49E1-9A0B-7B50CAB8D0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.21.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E057BFB1-BFF7-42F4-A237-15DCDCB834A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.21.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18DAF075-2DE2-416A-BBFE-30E501F64ED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.22.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4B7C60-F977-4002-ADE3-A82326607F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.22.2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C8F7822-F612-4FFA-9C6A-9465F909165B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.22.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B423C9-CE58-4C57-AF6A-52278140A4C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arista:veos:4.23.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D0FAEA-092E-4BC9-8494-96028781BA48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad en Cloud EOS VM / vEOS de Arista versiones 4.23.2M e publicaciones inferiores en el c\u00f3digo del Enrutador 4.23.x train, 4.22.4M y publicaciones inferiores en 4.22.x  train, versiones 4.21.3M hasta 4.21.9M en 4.21.x train , 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1 y 4.23.2.1, en un escenario donde las opciones TCP MSS son configuradas"
    }
  ],
  "id": "CVE-2020-11622",
  "lastModified": "2024-11-21T04:58:16.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-10T20:15:13.157",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-24512 (GCVE-0-2023-24512)

Vulnerability from cvelistv5 – Published: 2023-04-25 00:00 – Updated: 2025-02-03 19:15
VLAI?
Summary
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
CWE
  • CWE-284 - Improper Access Control
Assigner
Impacted products
Vendor Product Version
Arista Networks Terminattr Affected: 1.23.0
Affected: unspecified , ≤ 1.19.5 (custom)
Affected: 1.24.0 , ≤ 1.24.3 (custom)
Affected: 1.22.0 , ≤ 1.22.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:56:04.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24512",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T19:15:55.595547Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-03T19:15:59.467Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Terminattr",
          "vendor": "Arista Networks",
          "versions": [
            {
              "status": "affected",
              "version": "1.23.0"
            },
            {
              "lessThanOrEqual": "1.19.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.24.3",
              "status": "affected",
              "version": "1.24.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.22.1",
              "status": "affected",
              "version": "1.22.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24512 the following conditions must be all be met:\n\nA vulnerable version of the Streaming Telemetry Agent must be installed on the switch. The version can be verified with the following commands:\n#show version detail | grep TerminAttr-core\nTerminAttr-core      v1.13.3         1\n\nIn the above example, TerminAttr 1.13.3 is installed.\n\nThe agent must be running on the switch. This can be verified as follows on the switch:\nswitch# show daemon TerminAttr\nProcess: TerminAttr (running with PID 2430)\n\n\nThe Streaming Telemetry Agent must be configured to allow external connections using gRPC. This can be verified by the presence of the -grpcaddr option:\nswitch# daemon TerminAttr\n    show active\ndaemon TerminAttr\n   exec /usr/bin/TerminAttr -grpcaddr=... \u003cother options...\u003e"
        }
      ],
      "datePublic": "2023-04-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-25T00:00:00.000Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "While the steps listed above resolve the issue, the recommended long term solution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nThere are two possible solutions:\n\nUpgrade the Streaming Telemetry Agent \nCustomers can upgrade the Streaming Telemetry Agent to a fixed version, following the directions in https://arista.my.site.com/AristaCommunity/s/article/terminattr-upgrade-downgrade. Fixes are available in the following supported release trains:\nTerminAttr 1.25.0 and later Terminattr versions\nUsers of 1.24.X and 1.23.X TerminAttr releases should upgrade to TerminAttr 1.25.0 or later.\nTerminAttr 1.22.2 and later version in the TerminAttr 1.22.X train\nTerminAttr 1.19.6 and later versions in the TerminAttr 1.19.X train\n"
        },
        {
          "lang": "en",
          "value": "Upgrade EOS\nCustomers can upgrade to a version of EOS which contains a fixed version of the Streaming Telemetry Agent within the EOS image, as documented in https://www.arista.com/en/um-eos/eos-upgradedowngrade-overview:\nEOS 4.29.2F and later releases, which contains TerminAttr 1.25.0  or a more recent version\nEOS 4.28.6M and later releases in the 4.28.X train, which contains TerminAttr 1.22.2 or a more recent version\nEOS 4.27.9M and later releases in the 4.27.X train, which contains TerminAttr 1.19.6  or a more recent version\nEOS 4.26.10M and later releases in the 4.26.X train, which contains TerminAttr 1.19.6  or a more recent version\n"
        }
      ],
      "source": {
        "advisory": "86",
        "defect": [
          "751697"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. ",
      "workarounds": [
        {
          "lang": "en",
          "value": "The streaming telemetry agent can be configured in gRPC read-only mode by specifying -grpcreadonly as part of its configuration. For instance as follows:\n\nswitch# daemon TerminAttr\n   exec /usr/bin/TerminAttr -grpcreadonly -grpcaddr=... \u003cother options...\u003e\n   no shutdown\n\n\nIf TerminAttr is running, it must be restarted for the configuration to take effect. This can be done as follows:\n\nswitch# daemon TerminAttr\n   shutdown\n   wait-for-warmup\n   no shutdown"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24512",
    "datePublished": "2023-04-25T00:00:00.000Z",
    "dateReserved": "2023-01-24T00:00:00.000Z",
    "dateUpdated": "2025-02-03T19:15:59.467Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-24513 (GCVE-0-2023-24513)

Vulnerability from cvelistv5 – Published: 2023-04-12 00:00 – Updated: 2025-02-07 15:47
VLAI?
Summary
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
CWE
Assigner
Impacted products
Vendor Product Version
Arista Networks EOS Affected: 4.29.0 , ≤ 4.29.1F (custom)
Affected: 4.28.0 , ≤ 4.28.5M (custom)
Affected: 4.27.0 , ≤ 4.27.8M (custom)
Affected: 4.26.0 , ≤ 4.26.9M (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:56:04.274Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24513",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T15:47:04.977700Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-07T15:47:10.611Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "lessThanOrEqual": "4.29.1F",
              "status": "affected",
              "version": "4.29.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.28.5M",
              "status": "affected",
              "version": "4.28.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.27.8M",
              "status": "affected",
              "version": "4.27.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.26.9M",
              "status": "affected",
              "version": "4.26.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24545 and CVE-2023-24513, the switch must be configured to run the Software Forwarding Engine (Sfe). Sfe is the default configuration on CloudEOS platforms. "
        }
      ],
      "datePublic": "2023-04-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-126",
              "description": "CWE-126 Buffer Over-read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00.000Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-24513 has been fixed in the following releases:\n4.29.2F and later releases in the 4.29.x train\n4.28.6M and later releases in the 4.28.x train\n4.27.9M and later releases in the 4.27.x train\n4.26.10M and later releases in the 4.26.x train\n\n"
        },
        {
          "lang": "en",
          "value": "The following hotfixes can be applied to remediate both CVE-2023-24545 and CVE-2023-24513. Due to the size of the hotfixes, there are multiple files. Each hotfix applies to a specific set of release trSecurityAdvisory8X_4.28_Hotfix.swixains:\n\nNote: Installing/uninstalling the SWIX will cause Sfe agent to restart and stop forwarding traffic for up to 10 seconds.\n4.29.1F and below releases in the 4.29.x Train:\nURL:SecurityAdvisory85_4.29_Hotfix.swix\nSWIX Hash:\nSHA512 (SHA-512)c965e149cbbaa8698648af9290c5a728e9fe635186eee7629b789502ef37db4a94beea5ecd20e1dc8a19c2cc8988052b625cfccf764c28b8b0e9e4eef8e79bb4Open with Google Docs\n4.28.5M and below releases in the 4.28.x train:\nURL:SecurityAdvisory85_4.28_Hotfix.swix\nSWIX Hash:\n(SHA-512)522d51c6548111d9819ef8b1523b8798ac6847012955e3f885c6f466c81468960fbd4497b45289c8f77297263111340fbdbd7003a30b64e3ef9a270ace62c079\n4.27.8M and below releases in the 4.27.x train:\nURL:SecurityAdvisory85_4.27_Hotfix.swix\nSWIX Hash:\n(SHA-512)5ce5479c11abf185f50d484204555b2dfb9b1c93e8f475d027082ca0951cbfca0f331960a1dd111b8c079264b1dab31b0a62c8daf011afb27b1283c2382747a2Open with Go\n4.26.9M and below releases in the 4.26.x train:\nURL:SecurityAdvisory85_4.26_Hotfix.swix\nSWIX Hash:\n(SHA-512)9386f12a24f35679bdeb08d506bf0bddb9703d1ef3043de2c06d09ff47f2dd0d1bd7aca0748febb5b04fbdeaed7c4ae2922086fb638c754c3a9a5384306396d2\n"
        }
      ],
      "source": {
        "advisory": "85",
        "defect": [
          "764777"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected platforms running Arista CloudEOS a size check bypass issue in the Software Forwarding Engine (Sfe) may allow buffer over reads in later code. Additionally, depending on configured options this may cause a recomputation of the TCP checksum ...",
      "workarounds": [
        {
          "lang": "en",
          "value": "There is no mitigation / workaround for these issues."
        }
      ],
      "x_ConverterErrors": {
        "TITLE": {
          "error": "TITLE too long. Truncating in v5 record.",
          "message": "Truncated!"
        }
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24513",
    "datePublished": "2023-04-12T00:00:00.000Z",
    "dateReserved": "2023-01-24T00:00:00.000Z",
    "dateUpdated": "2025-02-07T15:47:10.611Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-24545 (GCVE-0-2023-24545)

Vulnerability from cvelistv5 – Published: 2023-04-12 00:00 – Updated: 2025-02-07 15:50
VLAI?
Summary
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Assigner
Impacted products
Vendor Product Version
Arista Networks EOS Affected: 4.29.0 , ≤ 4.29.1F (custom)
Affected: 4.28.0 , ≤ 4.28.4M (custom)
Affected: 4.27.0 , ≤ 4.27.7M (custom)
Affected: 4.26.8M , ≤ 4.26.8M (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:03:17.803Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24545",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T15:50:36.827968Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-07T15:50:41.522Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "lessThanOrEqual": "4.29.1F",
              "status": "affected",
              "version": "4.29.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.28.4M",
              "status": "affected",
              "version": "4.28.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.27.7M",
              "status": "affected",
              "version": "4.27.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.26.8M",
              "status": "affected",
              "version": "4.26.8M",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24545 and CVE-2023-24513, the switch must be configured to run the Software Forwarding Engine (Sfe). Sfe is the default configuration on CloudEOS platforms. "
        }
      ],
      "datePublic": "2023-04-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00.000Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-24545 has been fixed in the following releases:\n4.29.2F and later releases in the 4.29.x train\n4.28.5M and later releases in the 4.28.x train\n4.27.8M and later releases in the 4.27.x train\n4.26.9M and later releases in the 4.26.x train\n"
        },
        {
          "lang": "en",
          "value": "The following hotfixes can be applied to remediate both CVE-2023-24545 and CVE-2023-24513. Due to the size of the hotfixes, there are multiple files. Each hotfix applies to a specific set of release trSecurityAdvisory8X_4.28_Hotfix.swixains:\n\nNote: Installing/uninstalling the SWIX will cause Sfe agent to restart and stop forwarding traffic for up to 10 seconds.\n4.29.1F and below releases in the 4.29.x Train:\nURL:SecurityAdvisory85_4.29_Hotfix.swix\nSWIX Hash:\nSHA512 (SHA-512)c965e149cbbaa8698648af9290c5a728e9fe635186eee7629b789502ef37db4a94beea5ecd20e1dc8a19c2cc8988052b625cfccf764c28b8b0e9e4eef8e79bb4Open with Google Docs\n4.28.5M and below releases in the 4.28.x train:\nURL:SecurityAdvisory85_4.28_Hotfix.swix\nSWIX Hash:\n(SHA-512)522d51c6548111d9819ef8b1523b8798ac6847012955e3f885c6f466c81468960fbd4497b45289c8f77297263111340fbdbd7003a30b64e3ef9a270ace62c079\n4.27.8M and below releases in the 4.27.x train:\nURL:SecurityAdvisory85_4.27_Hotfix.swix\nSWIX Hash:\n(SHA-512)5ce5479c11abf185f50d484204555b2dfb9b1c93e8f475d027082ca0951cbfca0f331960a1dd111b8c079264b1dab31b0a62c8daf011afb27b1283c2382747a2Open with Go\n4.26.9M and below releases in the 4.26.x train:\nURL:SecurityAdvisory85_4.26_Hotfix.swix\nSWIX Hash:\n(SHA-512)9386f12a24f35679bdeb08d506bf0bddb9703d1ef3043de2c06d09ff47f2dd0d1bd7aca0748febb5b04fbdeaed7c4ae2922086fb638c754c3a9a5384306396d2\n"
        }
      ],
      "source": {
        "advisory": "85",
        "defect": [
          "743423"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch.",
      "workarounds": [
        {
          "lang": "en",
          "value": "There is no mitigation / workaround for these issues."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24545",
    "datePublished": "2023-04-12T00:00:00.000Z",
    "dateReserved": "2023-01-26T00:00:00.000Z",
    "dateUpdated": "2025-02-07T15:50:41.522Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-11622 (GCVE-0-2020-11622)

Vulnerability from cvelistv5 – Published: 2020-06-10 19:58 – Updated: 2024-08-04 11:35
VLAI?
Summary
A vulnerability exists in Arista’s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:35:13.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-10T19:58:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-11622",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arista.com/en/support/advisories-notices",
              "refsource": "MISC",
              "url": "https://www.arista.com/en/support/advisories-notices"
            },
            {
              "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49",
              "refsource": "CONFIRM",
              "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-11622",
    "datePublished": "2020-06-10T19:58:16",
    "dateReserved": "2020-04-07T00:00:00",
    "dateUpdated": "2024-08-04T11:35:13.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-24512 (GCVE-0-2023-24512)

Vulnerability from nvd – Published: 2023-04-25 00:00 – Updated: 2025-02-03 19:15
VLAI?
Summary
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
CWE
  • CWE-284 - Improper Access Control
Assigner
Impacted products
Vendor Product Version
Arista Networks Terminattr Affected: 1.23.0
Affected: unspecified , ≤ 1.19.5 (custom)
Affected: 1.24.0 , ≤ 1.24.3 (custom)
Affected: 1.22.0 , ≤ 1.22.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:56:04.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24512",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-03T19:15:55.595547Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-03T19:15:59.467Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Terminattr",
          "vendor": "Arista Networks",
          "versions": [
            {
              "status": "affected",
              "version": "1.23.0"
            },
            {
              "lessThanOrEqual": "1.19.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.24.3",
              "status": "affected",
              "version": "1.24.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "1.22.1",
              "status": "affected",
              "version": "1.22.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24512 the following conditions must be all be met:\n\nA vulnerable version of the Streaming Telemetry Agent must be installed on the switch. The version can be verified with the following commands:\n#show version detail | grep TerminAttr-core\nTerminAttr-core      v1.13.3         1\n\nIn the above example, TerminAttr 1.13.3 is installed.\n\nThe agent must be running on the switch. This can be verified as follows on the switch:\nswitch# show daemon TerminAttr\nProcess: TerminAttr (running with PID 2430)\n\n\nThe Streaming Telemetry Agent must be configured to allow external connections using gRPC. This can be verified by the presence of the -grpcaddr option:\nswitch# daemon TerminAttr\n    show active\ndaemon TerminAttr\n   exec /usr/bin/TerminAttr -grpcaddr=... \u003cother options...\u003e"
        }
      ],
      "datePublic": "2023-04-25T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-25T00:00:00.000Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "While the steps listed above resolve the issue, the recommended long term solution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nThere are two possible solutions:\n\nUpgrade the Streaming Telemetry Agent \nCustomers can upgrade the Streaming Telemetry Agent to a fixed version, following the directions in https://arista.my.site.com/AristaCommunity/s/article/terminattr-upgrade-downgrade. Fixes are available in the following supported release trains:\nTerminAttr 1.25.0 and later Terminattr versions\nUsers of 1.24.X and 1.23.X TerminAttr releases should upgrade to TerminAttr 1.25.0 or later.\nTerminAttr 1.22.2 and later version in the TerminAttr 1.22.X train\nTerminAttr 1.19.6 and later versions in the TerminAttr 1.19.X train\n"
        },
        {
          "lang": "en",
          "value": "Upgrade EOS\nCustomers can upgrade to a version of EOS which contains a fixed version of the Streaming Telemetry Agent within the EOS image, as documented in https://www.arista.com/en/um-eos/eos-upgradedowngrade-overview:\nEOS 4.29.2F and later releases, which contains TerminAttr 1.25.0  or a more recent version\nEOS 4.28.6M and later releases in the 4.28.X train, which contains TerminAttr 1.22.2 or a more recent version\nEOS 4.27.9M and later releases in the 4.27.X train, which contains TerminAttr 1.19.6  or a more recent version\nEOS 4.26.10M and later releases in the 4.26.X train, which contains TerminAttr 1.19.6  or a more recent version\n"
        }
      ],
      "source": {
        "advisory": "86",
        "defect": [
          "751697"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. ",
      "workarounds": [
        {
          "lang": "en",
          "value": "The streaming telemetry agent can be configured in gRPC read-only mode by specifying -grpcreadonly as part of its configuration. For instance as follows:\n\nswitch# daemon TerminAttr\n   exec /usr/bin/TerminAttr -grpcreadonly -grpcaddr=... \u003cother options...\u003e\n   no shutdown\n\n\nIf TerminAttr is running, it must be restarted for the configuration to take effect. This can be done as follows:\n\nswitch# daemon TerminAttr\n   shutdown\n   wait-for-warmup\n   no shutdown"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24512",
    "datePublished": "2023-04-25T00:00:00.000Z",
    "dateReserved": "2023-01-24T00:00:00.000Z",
    "dateUpdated": "2025-02-03T19:15:59.467Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-24513 (GCVE-0-2023-24513)

Vulnerability from nvd – Published: 2023-04-12 00:00 – Updated: 2025-02-07 15:47
VLAI?
Summary
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
CWE
Assigner
Impacted products
Vendor Product Version
Arista Networks EOS Affected: 4.29.0 , ≤ 4.29.1F (custom)
Affected: 4.28.0 , ≤ 4.28.5M (custom)
Affected: 4.27.0 , ≤ 4.27.8M (custom)
Affected: 4.26.0 , ≤ 4.26.9M (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:56:04.274Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24513",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T15:47:04.977700Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-07T15:47:10.611Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "lessThanOrEqual": "4.29.1F",
              "status": "affected",
              "version": "4.29.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.28.5M",
              "status": "affected",
              "version": "4.28.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.27.8M",
              "status": "affected",
              "version": "4.27.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.26.9M",
              "status": "affected",
              "version": "4.26.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24545 and CVE-2023-24513, the switch must be configured to run the Software Forwarding Engine (Sfe). Sfe is the default configuration on CloudEOS platforms. "
        }
      ],
      "datePublic": "2023-04-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-126",
              "description": "CWE-126 Buffer Over-read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00.000Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-24513 has been fixed in the following releases:\n4.29.2F and later releases in the 4.29.x train\n4.28.6M and later releases in the 4.28.x train\n4.27.9M and later releases in the 4.27.x train\n4.26.10M and later releases in the 4.26.x train\n\n"
        },
        {
          "lang": "en",
          "value": "The following hotfixes can be applied to remediate both CVE-2023-24545 and CVE-2023-24513. Due to the size of the hotfixes, there are multiple files. Each hotfix applies to a specific set of release trSecurityAdvisory8X_4.28_Hotfix.swixains:\n\nNote: Installing/uninstalling the SWIX will cause Sfe agent to restart and stop forwarding traffic for up to 10 seconds.\n4.29.1F and below releases in the 4.29.x Train:\nURL:SecurityAdvisory85_4.29_Hotfix.swix\nSWIX Hash:\nSHA512 (SHA-512)c965e149cbbaa8698648af9290c5a728e9fe635186eee7629b789502ef37db4a94beea5ecd20e1dc8a19c2cc8988052b625cfccf764c28b8b0e9e4eef8e79bb4Open with Google Docs\n4.28.5M and below releases in the 4.28.x train:\nURL:SecurityAdvisory85_4.28_Hotfix.swix\nSWIX Hash:\n(SHA-512)522d51c6548111d9819ef8b1523b8798ac6847012955e3f885c6f466c81468960fbd4497b45289c8f77297263111340fbdbd7003a30b64e3ef9a270ace62c079\n4.27.8M and below releases in the 4.27.x train:\nURL:SecurityAdvisory85_4.27_Hotfix.swix\nSWIX Hash:\n(SHA-512)5ce5479c11abf185f50d484204555b2dfb9b1c93e8f475d027082ca0951cbfca0f331960a1dd111b8c079264b1dab31b0a62c8daf011afb27b1283c2382747a2Open with Go\n4.26.9M and below releases in the 4.26.x train:\nURL:SecurityAdvisory85_4.26_Hotfix.swix\nSWIX Hash:\n(SHA-512)9386f12a24f35679bdeb08d506bf0bddb9703d1ef3043de2c06d09ff47f2dd0d1bd7aca0748febb5b04fbdeaed7c4ae2922086fb638c754c3a9a5384306396d2\n"
        }
      ],
      "source": {
        "advisory": "85",
        "defect": [
          "764777"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected platforms running Arista CloudEOS a size check bypass issue in the Software Forwarding Engine (Sfe) may allow buffer over reads in later code. Additionally, depending on configured options this may cause a recomputation of the TCP checksum ...",
      "workarounds": [
        {
          "lang": "en",
          "value": "There is no mitigation / workaround for these issues."
        }
      ],
      "x_ConverterErrors": {
        "TITLE": {
          "error": "TITLE too long. Truncating in v5 record.",
          "message": "Truncated!"
        }
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24513",
    "datePublished": "2023-04-12T00:00:00.000Z",
    "dateReserved": "2023-01-24T00:00:00.000Z",
    "dateUpdated": "2025-02-07T15:47:10.611Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-24545 (GCVE-0-2023-24545)

Vulnerability from nvd – Published: 2023-04-12 00:00 – Updated: 2025-02-07 15:50
VLAI?
Summary
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Assigner
Impacted products
Vendor Product Version
Arista Networks EOS Affected: 4.29.0 , ≤ 4.29.1F (custom)
Affected: 4.28.0 , ≤ 4.28.4M (custom)
Affected: 4.27.0 , ≤ 4.27.7M (custom)
Affected: 4.26.8M , ≤ 4.26.8M (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:03:17.803Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24545",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-07T15:50:36.827968Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-07T15:50:41.522Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "lessThanOrEqual": "4.29.1F",
              "status": "affected",
              "version": "4.29.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.28.4M",
              "status": "affected",
              "version": "4.28.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.27.7M",
              "status": "affected",
              "version": "4.27.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "4.26.8M",
              "status": "affected",
              "version": "4.26.8M",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "In order to be vulnerable to CVE-2023-24545 and CVE-2023-24513, the switch must be configured to run the Software Forwarding Engine (Sfe). Sfe is the default configuration on CloudEOS platforms. "
        }
      ],
      "datePublic": "2023-04-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00.000Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-24545 has been fixed in the following releases:\n4.29.2F and later releases in the 4.29.x train\n4.28.5M and later releases in the 4.28.x train\n4.27.8M and later releases in the 4.27.x train\n4.26.9M and later releases in the 4.26.x train\n"
        },
        {
          "lang": "en",
          "value": "The following hotfixes can be applied to remediate both CVE-2023-24545 and CVE-2023-24513. Due to the size of the hotfixes, there are multiple files. Each hotfix applies to a specific set of release trSecurityAdvisory8X_4.28_Hotfix.swixains:\n\nNote: Installing/uninstalling the SWIX will cause Sfe agent to restart and stop forwarding traffic for up to 10 seconds.\n4.29.1F and below releases in the 4.29.x Train:\nURL:SecurityAdvisory85_4.29_Hotfix.swix\nSWIX Hash:\nSHA512 (SHA-512)c965e149cbbaa8698648af9290c5a728e9fe635186eee7629b789502ef37db4a94beea5ecd20e1dc8a19c2cc8988052b625cfccf764c28b8b0e9e4eef8e79bb4Open with Google Docs\n4.28.5M and below releases in the 4.28.x train:\nURL:SecurityAdvisory85_4.28_Hotfix.swix\nSWIX Hash:\n(SHA-512)522d51c6548111d9819ef8b1523b8798ac6847012955e3f885c6f466c81468960fbd4497b45289c8f77297263111340fbdbd7003a30b64e3ef9a270ace62c079\n4.27.8M and below releases in the 4.27.x train:\nURL:SecurityAdvisory85_4.27_Hotfix.swix\nSWIX Hash:\n(SHA-512)5ce5479c11abf185f50d484204555b2dfb9b1c93e8f475d027082ca0951cbfca0f331960a1dd111b8c079264b1dab31b0a62c8daf011afb27b1283c2382747a2Open with Go\n4.26.9M and below releases in the 4.26.x train:\nURL:SecurityAdvisory85_4.26_Hotfix.swix\nSWIX Hash:\n(SHA-512)9386f12a24f35679bdeb08d506bf0bddb9703d1ef3043de2c06d09ff47f2dd0d1bd7aca0748febb5b04fbdeaed7c4ae2922086fb638c754c3a9a5384306396d2\n"
        }
      ],
      "source": {
        "advisory": "85",
        "defect": [
          "743423"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch.",
      "workarounds": [
        {
          "lang": "en",
          "value": "There is no mitigation / workaround for these issues."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24545",
    "datePublished": "2023-04-12T00:00:00.000Z",
    "dateReserved": "2023-01-26T00:00:00.000Z",
    "dateUpdated": "2025-02-07T15:50:41.522Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-11622 (GCVE-0-2020-11622)

Vulnerability from nvd – Published: 2020-06-10 19:58 – Updated: 2024-08-04 11:35
VLAI?
Summary
A vulnerability exists in Arista’s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:35:13.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-10T19:58:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-11622",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arista.com/en/support/advisories-notices",
              "refsource": "MISC",
              "url": "https://www.arista.com/en/support/advisories-notices"
            },
            {
              "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49",
              "refsource": "CONFIRM",
              "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-11622",
    "datePublished": "2020-06-10T19:58:16",
    "dateReserved": "2020-04-07T00:00:00",
    "dateUpdated": "2024-08-04T11:35:13.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}