3 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config. En las plataformas afectadas que ejecutan Arista MOS, la configuración de una contraseña BGP hará que la contraseña se registre en texto plano que los usuarios autenticados pueden revelar en registros locales o servidores de registro remotos, además de aparecer en texto plano en la configuración en ejecución del dispositivo. • https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 101EXPL: 0

On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart. • https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 8.8EPSS: 0%CPEs: 113EXPL: 1

On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision • https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •