cve-2015-8236
Vulnerability from cvelistv5
Published
2015-11-19 11:00
Modified
2024-08-06 08:13
Severity ?
Summary
Arista EOS before 4.11.12, 4.12 before 4.12.11, 4.13 before 4.13.14M, 4.14 before 4.14.5FX.5, and 4.15 before 4.15.0FX1.1 allows remote attackers to execute arbitrary code as root by leveraging management-plane access, aka Bug 138716.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:13:31.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arista EOS before 4.11.12, 4.12 before 4.12.11, 4.13 before 4.13.14M, 4.14 before 4.14.5FX.5, and 4.15 before 4.15.0FX1.1 allows remote attackers to execute arbitrary code as root by leveraging management-plane access, aka Bug 138716."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-11-19T11:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8236",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arista EOS before 4.11.12, 4.12 before 4.12.11, 4.13 before 4.13.14M, 4.14 before 4.14.5FX.5, and 4.15 before 4.15.0FX1.1 allows remote attackers to execute arbitrary code as root by leveraging management-plane access, aka Bug 138716."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15",
              "refsource": "CONFIRM",
              "url": "https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8236",
    "datePublished": "2015-11-19T11:00:00",
    "dateReserved": "2015-11-18T00:00:00",
    "dateUpdated": "2024-08-06T08:13:31.808Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.11.11\", \"matchCriteriaId\": \"71524F4D-7630-4326-AE3F-84C8A9BE11BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E50DA8ED-9F06-49DF-A877-328746B71570\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB7D75E5-40DA-433A-8DF2-1F562A67006A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA04B237-087B-429F-8131-4AF89F292FA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A827D16C-F33B-4DD2-8C07-1B22DA0EC7F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F464F691-C4BF-4435-92A0-AA52B1B97183\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B605DE34-7E40-459C-9CF8-0A656C9E1D68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.12.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2609F485-8315-41C0-9408-0F0763D1B919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.1.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E91F41E-C742-4DF9-A459-5F47712D3003\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.2.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CD0A315-8B21-4743-BE2C-DE6502A68B6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.3.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46FC89E0-F0E4-464E-B1D2-27FD55D780BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.4.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74690382-F303-4CBD-A369-8B1C315D6A42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8090F6A8-96F6-4801-BE68-2EA377E1C374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.5.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC0E6379-BD77-4630-9A7A-167F7706F3BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8059452-78B1-4D1F-8B9B-750ECDC2AC80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.7.2m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EE2ADFD-5BAE-4202-A8F4-83F83A034E8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.7.3m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D29B6DD-60C5-408B-8004-FD33260DF38C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.7m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FCAFAA3-7BF0-4CCA-9BEC-307853DF2432\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.8m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A2B8663-C00B-41A8-B6C1-7D9C502F6D32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.9.1m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED433550-947F-4200-8C2C-BFDEC69AE1F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.9m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AC03BC7-19D4-4C07-91A4-4D28E317E6A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.10m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08C66332-4DD9-4EB8-9698-0A7695F2CB64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.11m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F08F6E21-C1AC-40EC-A1C8-5B2CCB6EDD64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.12m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFAC5FBF-CE10-4DC6-AB49-C02EAFDA7D4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.13.13m:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51CD8572-4CF5-4485-8B96-D9C1CB6B4D8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.0f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C22DD2EA-9AEF-4276-9B2D-6564669AFF0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08AFBC86-F59A-4E57-ABCB-D919DEC6440B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.2f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7679792F-D7B1-40EB-8283-58547EEE6999\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.3.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F9313F9-AD0D-473F-A50C-DC25F8A94863\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.3f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8ED3B1CE-4883-4EA3-8C8B-7A45ABDE9AA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.4.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA2E8AC2-ADF9-48EE-9BCB-CEE482F66EC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.4.2f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54777F41-D817-4869-BB05-08E87F3BEE08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.4f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B05FAE7-1163-4069-ADE4-227C277DD31C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5.1f-ssu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D1AF806-4F05-41A9-8E20-8B897040CBB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"152C30AA-50CB-4E2F-BB96-61F9DC3415D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5fx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93414D88-FACA-416A-AB29-F2FF5590F3C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5fx.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8866B66E-228C-452E-A91F-167D41AD655E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5fx.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD04C7F6-BA5F-4F99-BA62-0F263215DF9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5fx.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FC43FBD-48E6-4C38-AB67-FAE9E7198D55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.5fx.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8822175C-0044-475D-88F5-82F696A0F1EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.6f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF864DAA-6330-4CD2-879D-541E7798F4DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.7.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC88F59D-05A0-4644-8C80-C893057F36E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.7f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E18622AC-C91E-45A9-ACFE-7E2C0CE5E9D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.8.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E1DFACB-A5EC-4E5D-9630-84C31D8933B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.8f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25234B08-26ED-4F5B-9371-B56DBE22E2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.14.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CB8B476-5836-4BB6-85A2-CADB64DA14E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.0f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58509BF7-D277-4DB3-AB36-8D34296EE7FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.0fx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEF84DE8-D0F4-40C3-9FDA-E72C023EA7D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.0fx1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55305455-2AF8-467A-8657-02C450FDF7B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.0fxa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFE8E17B-3DF3-42D1-B0F5-1F33E40DBE58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.1f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A4D893-1B18-4D97-A7C3-D97F127EB82A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.1fx-7060qx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"553D7D97-ECB5-4DBD-9119-511978100F3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.1fx-7060x:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBC94AD6-5EBA-4610-8B7B-8547F71CC7A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.1fxb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6B79CAC-3A78-4DFA-B33E-D0674D1AEDB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:eos:4.15.2f:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAF59F67-AEAB-459E-B9EF-C7E04DC3C18F\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Arista EOS before 4.11.12, 4.12 before 4.12.11, 4.13 before 4.13.14M, 4.14 before 4.14.5FX.5, and 4.15 before 4.15.0FX1.1 allows remote attackers to execute arbitrary code as root by leveraging management-plane access, aka Bug 138716.\"}, {\"lang\": \"es\", \"value\": \"Arista EOS en versiones anteriores a 4.11.12, 4.12 en versiones anteriores a 4.12.11, 4.13 en versiones anteriores a 4.13.14M, 4.14 en versiones anteriores a 4.14.5FX.5 y 4.15 en versiones anteriores a 4.15.0FX1.1 permite a atacantes remotos ejecutar c\\u00f3digo arbitrario como root mediante el aprovechamiento de acceso al plano de gesti\\u00f3n, tambi\\u00e9n conocido como Bug 138716.\"}]",
      "id": "CVE-2015-8236",
      "lastModified": "2024-11-21T02:38:09.673",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2015-11-19T11:59:03.000",
      "references": "[{\"url\": \"https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-8236\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-11-19T11:59:03.000\",\"lastModified\":\"2024-11-21T02:38:09.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Arista EOS before 4.11.12, 4.12 before 4.12.11, 4.13 before 4.13.14M, 4.14 before 4.14.5FX.5, and 4.15 before 4.15.0FX1.1 allows remote attackers to execute arbitrary code as root by leveraging management-plane access, aka Bug 138716.\"},{\"lang\":\"es\",\"value\":\"Arista EOS en versiones anteriores a 4.11.12, 4.12 en versiones anteriores a 4.12.11, 4.13 en versiones anteriores a 4.13.14M, 4.14 en versiones anteriores a 4.14.5FX.5 y 4.15 en versiones anteriores a 4.15.0FX1.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario como root mediante el aprovechamiento de acceso al plano de gesti\u00f3n, tambi\u00e9n conocido como Bug 138716.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.11.11\",\"matchCriteriaId\":\"71524F4D-7630-4326-AE3F-84C8A9BE11BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50DA8ED-9F06-49DF-A877-328746B71570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB7D75E5-40DA-433A-8DF2-1F562A67006A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA04B237-087B-429F-8131-4AF89F292FA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A827D16C-F33B-4DD2-8C07-1B22DA0EC7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F464F691-C4BF-4435-92A0-AA52B1B97183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B605DE34-7E40-459C-9CF8-0A656C9E1D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2609F485-8315-41C0-9408-0F0763D1B919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.1.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E91F41E-C742-4DF9-A459-5F47712D3003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.2.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD0A315-8B21-4743-BE2C-DE6502A68B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.3.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FC89E0-F0E4-464E-B1D2-27FD55D780BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.4.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74690382-F303-4CBD-A369-8B1C315D6A42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8090F6A8-96F6-4801-BE68-2EA377E1C374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.5.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0E6379-BD77-4630-9A7A-167F7706F3BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8059452-78B1-4D1F-8B9B-750ECDC2AC80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.7.2m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE2ADFD-5BAE-4202-A8F4-83F83A034E8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.7.3m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D29B6DD-60C5-408B-8004-FD33260DF38C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.7m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FCAFAA3-7BF0-4CCA-9BEC-307853DF2432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.8m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A2B8663-C00B-41A8-B6C1-7D9C502F6D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.9.1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED433550-947F-4200-8C2C-BFDEC69AE1F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.9m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC03BC7-19D4-4C07-91A4-4D28E317E6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.10m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C66332-4DD9-4EB8-9698-0A7695F2CB64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.11m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08F6E21-C1AC-40EC-A1C8-5B2CCB6EDD64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.12m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFAC5FBF-CE10-4DC6-AB49-C02EAFDA7D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.13.13m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CD8572-4CF5-4485-8B96-D9C1CB6B4D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C22DD2EA-9AEF-4276-9B2D-6564669AFF0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08AFBC86-F59A-4E57-ABCB-D919DEC6440B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7679792F-D7B1-40EB-8283-58547EEE6999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.3.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9313F9-AD0D-473F-A50C-DC25F8A94863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.3f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ED3B1CE-4883-4EA3-8C8B-7A45ABDE9AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.4.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA2E8AC2-ADF9-48EE-9BCB-CEE482F66EC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.4.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54777F41-D817-4869-BB05-08E87F3BEE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.4f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B05FAE7-1163-4069-ADE4-227C277DD31C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5.1f-ssu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D1AF806-4F05-41A9-8E20-8B897040CBB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152C30AA-50CB-4E2F-BB96-61F9DC3415D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5fx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93414D88-FACA-416A-AB29-F2FF5590F3C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5fx.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8866B66E-228C-452E-A91F-167D41AD655E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5fx.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD04C7F6-BA5F-4F99-BA62-0F263215DF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5fx.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC43FBD-48E6-4C38-AB67-FAE9E7198D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.5fx.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8822175C-0044-475D-88F5-82F696A0F1EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.6f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF864DAA-6330-4CD2-879D-541E7798F4DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.7.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC88F59D-05A0-4644-8C80-C893057F36E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.7f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E18622AC-C91E-45A9-ACFE-7E2C0CE5E9D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.8.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1DFACB-A5EC-4E5D-9630-84C31D8933B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.8f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25234B08-26ED-4F5B-9371-B56DBE22E2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.14.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB8B476-5836-4BB6-85A2-CADB64DA14E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58509BF7-D277-4DB3-AB36-8D34296EE7FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.0fx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF84DE8-D0F4-40C3-9FDA-E72C023EA7D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.0fx1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55305455-2AF8-467A-8657-02C450FDF7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.0fxa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE8E17B-3DF3-42D1-B0F5-1F33E40DBE58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A4D893-1B18-4D97-A7C3-D97F127EB82A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.1fx-7060qx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"553D7D97-ECB5-4DBD-9119-511978100F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.1fx-7060x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC94AD6-5EBA-4610-8B7B-8547F71CC7A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.1fxb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B79CAC-3A78-4DFA-B33E-D0674D1AEDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:4.15.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF59F67-AEAB-459E-B9EF-C7E04DC3C18F\"}]}]}],\"references\":[{\"url\":\"https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arista.com/support/advisories-notices/security-advisories/1221-security-advisory-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.