All the vulnerabilites related to arista - veos
cve-2020-11622
Vulnerability from cvelistv5
Published
2020-06-10 19:58
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
A vulnerability exists in Arista’s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured.
References
▼ | URL | Tags |
---|---|---|
https://www.arista.com/en/support/advisories-notices | x_refsource_MISC | |
https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-10T19:58:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.arista.com/en/support/advisories-notices", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49", "refsource": "CONFIRM", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11622", "datePublished": "2020-06-10T19:58:16", "dateReserved": "2020-04-07T00:00:00", "dateUpdated": "2024-08-04T11:35:13.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-24510
Vulnerability from cvelistv5
Published
2023-06-05 00:00
Modified
2025-01-08 17:46
Severity ?
EPSS score ?
Summary
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Arista Networks | Arista EOS |
Version: 4.25.0F < Version: 4.26.0F < Version: 4.27.0F < Version: 4.28.0F < Version: 4.29.0F < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:56:04.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24510", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T17:46:21.374238Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T17:46:55.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Arista EOS", "vendor": "Arista Networks", "versions": [ { "lessThanOrEqual": "4.25.10M", "status": "affected", "version": "4.25.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.26.9M", "status": "affected", "version": "4.26.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.27.9M", "status": "affected", "version": "4.27.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.28.6.1M", "status": "affected", "version": "4.28.0F", "versionType": "custom" }, { "lessThanOrEqual": "4.29.1F", "status": "affected", "version": "4.29.0F", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "In order to be vulnerable to CVE-2023-24510, the following condition must be met:\nAt least two \u201cip helper-address\u201d commands for the DHCP server are configured on the same interface.\n \u2013 Scenario One: One command uses \u201csource-interface\u201d, with or without being in a VRF. The second command does not use a source-interface and does not use a VRF.\n \u2013 Scenario Two: One command is run inside of a VRF. The second command does not use a source-interface and does not use a VRF." } ], "datePublic": "2023-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T00:00:00", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista" }, "references": [ { "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" } ], "solutions": [ { "lang": "en", "value": "CVE-2023-24510 has been fixed in the following releases:\n - 4.29.2F and later releases in the 4.29.x train\n - 4.28.7M and later releases in the 4.28.x train\n - 4.27.10M and later releases in the 4.27.x train\n - 4.26.10M and later releases in the 4.26.x train" } ], "source": { "advisory": "Security Advisory 0087", "defect": [ "BUG753188" ], "discovery": "INTERNAL" }, "title": "On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.", "workarounds": [ { "lang": "en", "value": "The hotfix https://www.arista.com/support/advisories-notices/sa-download?sa=87-SecurityAdvisory87_Hotfix.swix can be used to remediate CVE-2023-24510. The hotfix only applies to the releases listed below and no other releases:\n - 4.29.1F and below releases in the 4.29.x train\n - 4.28.6.1M and below releases in the 4.28.x train\n - 4.27.9M and below releases in the 4.27.x train\n - 4.26.9M and below releases in the 4.26.x train\n - 4.25.10M and below releases in the 4.25.x train" } ], "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2023-24510", "datePublished": "2023-06-05T00:00:00", "dateReserved": "2023-01-24T00:00:00", "dateUpdated": "2025-01-08T17:46:55.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-06-10 20:15
Modified
2024-11-21 04:58
Severity ?
Summary
A vulnerability exists in Arista’s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
arista | cloudeos | * | |
arista | cloudeos | * | |
arista | cloudeos | * | |
arista | cloudeos | 4.21.3fx-7368 | |
arista | cloudeos | 4.21.4-fcrfx | |
arista | cloudeos | 4.21.4.1 | |
arista | cloudeos | 4.21.7.1 | |
arista | cloudeos | 4.22.2.0.1 | |
arista | cloudeos | 4.22.2.2.1 | |
arista | cloudeos | 4.22.3.1 | |
arista | cloudeos | 4.23.2.1 | |
arista | veos | * | |
arista | veos | * | |
arista | veos | * | |
arista | veos | 4.21.3fx-7368 | |
arista | veos | 4.21.4-fcrfx | |
arista | veos | 4.21.4.1 | |
arista | veos | 4.21.7.1 | |
arista | veos | 4.22.2.0.1 | |
arista | veos | 4.22.2.2.1 | |
arista | veos | 4.22.3.1 | |
arista | veos | 4.23.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D551EEF0-4216-492B-BFE0-D3D646C975AC", "versionEndIncluding": "4.21.9m", "versionStartIncluding": "4.21.3m", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*", "matchCriteriaId": "791E5CEC-AE25-49CA-BFF2-CD718DC27A5B", "versionEndIncluding": "4.22.4m", "versionStartIncluding": "4.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF13C82C-9207-476C-B25F-39B77128F8E5", "versionEndIncluding": "4.23.2m", "versionStartIncluding": "4.23.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.21.3fx-7368:*:*:*:*:*:*:*", "matchCriteriaId": "D13B96E1-1A0B-4D14-BCE1-D2E4843747B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.21.4-fcrfx:*:*:*:*:*:*:*", "matchCriteriaId": "473A0E2D-C9FF-4B5B-9A20-82331D876945", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.21.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0477187E-50AC-470F-BAE8-9E2699D7BA1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.21.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBF773D2-BD2E-4FFF-97EF-E6A6BD78B1A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.22.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1271EED-6536-4C63-B81C-4B78C38E60FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.22.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "55317FD4-B808-4035-8C3D-67C96C55D5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.22.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "8FA41E8C-B18F-4738-9764-1455F6D12670", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:cloudeos:4.23.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8DC49B8-9CC1-4219-8CFB-5DBE83C6349F", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:*:*:*:*:*:*:*:*", "matchCriteriaId": "09DA14B6-DF76-4509-A9EB-5B28CDD86927", "versionEndIncluding": "4.21.9m", "versionStartIncluding": "4.21.3m", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D223445-DE06-480D-A06C-9E9E63BDBD72", "versionEndIncluding": "4.22.4m", "versionStartIncluding": "4.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D79167BC-5EEF-4C91-8E7F-E142A26B4A2D", "versionEndIncluding": "4.23.2m", "versionStartIncluding": "4.23.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.21.3fx-7368:*:*:*:*:*:*:*", "matchCriteriaId": "19E505BF-3F7A-43FE-ADC5-2B0368924E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.21.4-fcrfx:*:*:*:*:*:*:*", "matchCriteriaId": "D9E75DB8-360E-49E1-9A0B-7B50CAB8D0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.21.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E057BFB1-BFF7-42F4-A237-15DCDCB834A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.21.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "18DAF075-2DE2-416A-BBFE-30E501F64ED4", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.22.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D4B7C60-F977-4002-ADE3-A82326607F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.22.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C8F7822-F612-4FFA-9C6A-9465F909165B", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.22.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7B423C9-CE58-4C57-AF6A-52278140A4C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:arista:veos:4.23.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "49D0FAEA-092E-4BC9-8494-96028781BA48", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in Arista\u2019s Cloud EOS VM / vEOS 4.23.2M and below releases in the 4.23.x train, 4.22.4M and below releases in the 4.22.x train, 4.21.3M to 4.21.9M releases in the 4.21.x train, 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1, and 4.23.2.1 Router code in a scenario where TCP MSS options are configured." }, { "lang": "es", "value": "Se presenta una vulnerabilidad en Cloud EOS VM / vEOS de Arista versiones 4.23.2M e publicaciones inferiores en el c\u00f3digo del Enrutador 4.23.x train, 4.22.4M y publicaciones inferiores en 4.22.x train, versiones 4.21.3M hasta 4.21.9M en 4.21.x train , 4.21.3FX-7368.*, 4.21.4-FCRFX.*, 4.21.4.1, 4.21.7.1, 4.22.2.0.1, 4.22.2.2.1, 4.22.3.1 y 4.23.2.1, en un escenario donde las opciones TCP MSS son configuradas" } ], "id": "CVE-2020-11622", "lastModified": "2024-11-21T04:58:16.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-10T20:15:13.157", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/11195-security-advisory-49" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-05 22:15
Modified
2024-11-21 07:48
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EBD228-42BD-48F2-A9FA-C7F007A401A3", "versionEndIncluding": "4.25.10m", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "341CA00E-8BDE-4BF9-90D4-7B07FC484D18", "versionEndExcluding": "4.26.10m", "versionStartIncluding": "4.26.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "65C3AA23-CE24-48EE-B471-A03F451C6F35", "versionEndExcluding": "4.27.10m", "versionStartIncluding": "4.27.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "255A4F4F-1563-4557-BCBB-3BB1309A8889", "versionEndExcluding": "4.28.7m", "versionStartIncluding": "4.28.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "matchCriteriaId": "24621B26-04A1-4693-BCB4-437544C08B50", "versionEndExcluding": "4.29.2f", "versionStartIncluding": "4.29.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:arista:ceos:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6833D11-7AB5-41CC-83AE-FE28913DDFB8", "vulnerable": false }, { "criteria": "cpe:2.3:a:arista:cloudeos:-:*:*:*:*:*:*:*", "matchCriteriaId": "362F2E0F-3D40-444F-87F3-21CA70B1AD04", "vulnerable": false }, { "criteria": "cpe:2.3:a:arista:veos:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0B16F-F18E-48F9-87A5-AE0D9E5C3FAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC3D5B4-3B6F-4F15-9CAA-B0D08B53FFC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010t-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CCF6152-815E-4B3C-AE4B-CA598BEBD020", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010tx-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E00C871-8EB3-4241-95F3-83A524A79FB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7010tx-48-dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC52FD-29BE-4037-9A7C-264ACF9F6C0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020r:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3371EEF-9D7A-4EF6-A435-A0F1034E5EE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020sr-24c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7781CB15-3452-47D9-A961-8B09F2E9AEC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020sr-32c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A31FB8-512E-43EF-8F87-E02E35F5251E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020tr-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CBFF922-28D7-42D6-8796-91AD9A178D28", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7020tra-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "561B4042-DFD3-4BC0-9C5F-74799A7E92C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1FF0290-C671-4ABC-8A12-05E4D55FC4AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "828C6E4F-814A-4060-8F5E-7FF359C8739C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "253D74DE-97F5-40F3-B179-D2D4442C57FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E03F9E-522F-4D9B-9267-09E2550B5465", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "895A7AFD-BE76-47F5-B67B-6279046E4274", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "74E258EC-EA50-4185-AA35-5D963C359E74", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "1482D4FC-60B9-4C89-B892-71AA3E1031F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "C99D84E9-2229-459E-AE90-49C2EF670884", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D922C725-1139-4DD4-92FC-9FF15E35CE62", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE35C17F-0C60-4A40-9949-D4C5D94D1D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "07BA078E-30B7-4E2C-B240-BF64E98143E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFD0706-CACB-40FA-A41B-46B39C6E1D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "5951D243-CB68-4B41-A913-D879CE502795", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*", "matchCriteriaId": "73156612-D338-4E20-8C82-0E65DAA72331", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "78E7CDCC-ADC6-4854-BFC4-72DA47C5F10B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B03678D-AD7B-4B1A-8E6A-1811DD8B1483", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E803639C-13A1-48CA-A589-C83654AE454F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*", "matchCriteriaId": "A495D282-D3DC-4D18-AB72-2358834C238E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*", "matchCriteriaId": "388C57D8-4B3C-4E5D-84AA-0CB7506F825A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D518C8D5-A86B-46E5-A646-8939BFA2E116", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1608297-7079-4F3B-857E-708B74E944D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "806A01C5-231D-4F9D-A292-E9DD706A0C66", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC10746F-8FC0-49EF-BB9C-EC49B734DFA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "26582E98-B710-46D7-B8F2-9286E0592FA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D832798-DA45-4F9E-AA31-5D088253A28A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130-16g3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFA321D-F4A5-434C-BB39-D2B2687001D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130-48g3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BE67B8-F326-48B7-AB82-04FE8C2E37E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7130-96s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3264E086-4E90-41D0-8583-8FCF3CE4885D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D74C0B-E470-4D45-98E2-775DE43997DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B2CAA23-003C-43E6-87CE-61E4369C2D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7445075-D130-472C-B259-6BACE678541D", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF3FA52A-3A67-4515-9790-598860102893", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "6336F166-FAD3-4846-84B9-45F5FAA3D437", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7160-32cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "7620401C-FB14-46F1-979B-B21194F90945", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7160-48tc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DFC236-44B3-4EEF-8937-4F86EE99EB45", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7160-48yc6:-:*:*:*:*:*:*:*", "matchCriteriaId": "823E5569-C918-40E6-A2C5-7C415E4ADEF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8EFEEA5-0FC4-4FFC-BF5D-BDBAA1B55C70", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2959C68-8731-4F37-B9E7-61E5936D3D8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FB3395-8D13-4477-A46E-37A88272CFAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7170b-64c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EE3572E-A724-4057-8776-7A95528DCEE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720df-48y:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FCDB83-38D5-4F02-97E2-BBEF891DCDD7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dp-24s:-:*:*:*:*:*:*:*", "matchCriteriaId": "80EAF795-EB62-4A86-A0FC-A09008E631A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dp-48s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA03BA0B-BB2D-41CF-BA2E-B21604D6FBC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dt-24s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AE185FD-0D4D-4862-B513-BC68BF3F9F7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dt-48s:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C2150F-2FD6-452F-8C56-7413E3EB8FDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720dt-48y:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A568A1-BA88-458E-B69A-0A2A6C594728", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFDBCBB-2C1A-4B88-AE28-EF63D5B9EDD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*", "matchCriteriaId": "58757129-BF9C-4BD8-B692-BB57023F8A48", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2756BB4B-1053-4EAC-AC0B-785FD5039D5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D36540-7723-4284-A207-6BD27728CA25", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF95CB28-E010-4A1D-A746-F9DDF015868F", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:722xpm-48y4:-:*:*:*:*:*:*:*", "matchCriteriaId": "15876058-5E5D-4C87-83A3-592ADCA0AA6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:722xpm-48zy8:-:*:*:*:*:*:*:*", "matchCriteriaId": "426308A9-D534-4465-865C-39BC70548B00", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DD95B3B-D655-42DC-85C2-2C6FDBCC77F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40D14DE-BAFB-461F-9AA7-E3EDC2D8D468", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "901E5B76-0EB7-4EAD-A281-15B9F78041AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BAE58E-F4B5-4C8F-9EEB-5A0F38A96F0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE1DE992-9BFA-4794-82F4-66F464BB384E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260qx-64:-:*:*:*:*:*:*:*", "matchCriteriaId": "83A3811A-EB0E-464B-86E7-0E369935A507", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7260sx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "58296832-AA93-4EAE-96BD-28EC368F8391", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6466FE3-DCE8-4DA5-B893-2BA864F73BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "21CB1AAF-FC82-4A80-9932-42E8EFA3906A", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "60FC964C-9835-443A-A584-3A5D6022E914", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDF8A65D-6FBC-4C38-8B45-418E6C5EB16C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F088D51-24F4-49AD-8397-73D1EAF45F56", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BA5C6D-40C0-4AA3-AC10-D7F097D8EDD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0040BDDF-D711-4619-9E96-96EFBD33CAA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4AA716D-CAD1-4689-8A26-977A2E5F869E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AD08CBF-6F42-4F98-B413-F65C5613BE6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7358x4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC38094-A539-425D-A2B6-770FAF0FC3C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*", "matchCriteriaId": "161DB0D9-9BAC-4546-88D3-5547F4B6149C", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7388x5:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66E706E-56FB-4A49-BD90-76A8CB6BE391", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:750:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BD5D5BB-96D6-43F5-A394-829E7866AF3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C61DCC-D1CF-4CE5-9634-4BE3E071E83E", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC651584-113E-4859-9F14-12D62F3BD626", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*", "matchCriteriaId": "583725F6-8583-425C-A847-700DBB9169E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C6A4B3C-FF12-4DCD-9945-8450AD0BDEED", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE1BB565-2668-4242-8A00-5CC9C30B9AC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*", "matchCriteriaId": "15F1A605-8836-4A64-AC5E-ADAB34F8F104", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE8A047A-9FD9-4AE1-9E47-457A46BAE3A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "019B0670-389B-4A4E-8C72-52202E3AA8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D19E86BF-AA91-4262-8EF9-B7FC48C6F3F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "58443CDE-33D8-4460-A861-CDC07431AA22", "vulnerable": false }, { "criteria": "cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*", "matchCriteriaId": "64BE8C68-FE98-4162-A3D3-54494D5444F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart." } ], "id": "CVE-2023-24510", "lastModified": "2024-11-21T07:48:01.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@arista.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-05T22:15:11.717", "references": [ { "source": "psirt@arista.com", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087" } ], "sourceIdentifier": "psirt@arista.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "psirt@arista.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }