79 results (0.013 seconds)

CVSS: 3.1EPSS: 0%CPEs: 2EXPL: 0

On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some En las plataformas FPGA de la serie 7130 afectadas que ejecutan MOS y versiones recientes de FPGA MultiAccess, la aplicación de ACL puede provocar un funcionamiento incorrecto de la ACL configurada para un puerto, lo que da como resultado que se permitan algunos paquetes que deberían negarse y algunos • https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091 • CWE-283: Unverified Ownership •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Multiple SQL Injection vulnerabilities exist in the reporting application of the Arista Edge Threat Management - Arista NG Firewall (NGFW). A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges. Existen múltiples vulnerabilidades de inyección SQL en la aplicación de informes de Arista Edge Threat Management - Arista NG Firewall (NGFW). Un usuario con derechos avanzados de acceso a la aplicación de informes puede aprovechar la inyección SQL, permitiéndole ejecutar comandos en el sistema operativo subyacente con privilegios elevados. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. • https://https://www.arista.com/en/support/advisories-notices/security-advisory/19038-security-advisory-0093 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config. En las plataformas afectadas que ejecutan Arista MOS, la configuración de una contraseña BGP hará que la contraseña se registre en texto plano que los usuarios autenticados pueden revelar en registros locales o servidores de registro remotos, además de aparecer en texto plano en la configuración en ejecución del dispositivo. • https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 48EXPL: 1

On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload. • https://www.arista.com/en/support/advisories-notices/security-advisory/18042-security-advisory-0088 • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 47EXPL: 1

On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place. • https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •