
CVE-2020-24333
https://notcve.org/view.php?id=CVE-2020-24333
22 Sep 2020 — A vulnerability in Arista’s CloudVision Portal (CVP) prior to 2020.2 allows users with “read-only” or greater access rights to the Configlet Management module to download files not intended for access, located on the CVP server, by accessing a specific API. Una vulnerabilidad en CloudVision Portal (CVP) de Arista versiones anteriores a 2020.2, permite a usuarios con derechos de acceso "read-only" o superiores en el módulo Configlet Management descargar archivos no previstos para acceso, ubicados en el servi... • https://www.arista.com/en/support/advisories-notices •

CVE-2020-13881 – Ubuntu Security Notice USN-4521-1
https://notcve.org/view.php?id=CVE-2020-13881
06 Jun 2020 — In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. En el archivo support.c en pam_tacplus versiones 1.3.8 hasta 1.5.1, el secreto compartido TACACS+ es registrado por medio de syslog si el nivel de registro DEBUG y journald son usados It was discovered that pam_tacplus did not properly manage shared secrets if DEBUG loglevel and journald are used. A remote attacker could use this issue to expose sensitive information... • http://www.openwall.com/lists/oss-security/2020/06/08/1 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2019-18181
https://notcve.org/view.php?id=CVE-2019-18181
19 Dec 2019 — In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentially enable authenticated users with read-only access to take actions that are otherwise restricted in the GUI. En CloudVision Portal, todos las versiones en el tren de Code versiones 2018.1 y 2018.2, permiten a usuarios con permisos de solo lectura omitir los pe... • https://www.arista.com/en/support/advisories-notices/security-advisories/9001-security-advisory-44 •

CVE-2019-18615
https://notcve.org/view.php?id=CVE-2019-18615
19 Dec 2019 — In CloudVision Portal (CVP) for all releases in the 2018.2 Train, under certain conditions, the application logs user passwords in plain text for certain API calls, potentially leading to user password exposure. This only affects CVP environments where: 1. Devices have enable mode passwords which are different from the user's login password, OR 2. There are configlet builders that use the Device class and specify username and password explicitly Application logs are not accessible or visible from the CVP GU... • https://www.arista.com/en/support/advisories-notices/security-advisories/9002-security-advisory-45 • CWE-312: Cleartext Storage of Sensitive Information CWE-522: Insufficiently Protected Credentials •

CVE-2019-17596 – golang: invalid public key causes panic in dsa.Verify
https://notcve.org/view.php?id=CVE-2019-17596
24 Oct 2019 — Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates. Go versiones anteriores a 1.12.11 y versiones 1.3.x anteriores a 1.13.2, puede entrar en pánico tras intentar procesar el tráfico de red que contiene una clave pública DSA no válida. Existen varios escenarios de ataque, tal y como el tráfico de un cliente hacia un s... • https://github.com/pquerna/poc-dsa-verify-CVE-2019-17596 • CWE-295: Improper Certificate Validation CWE-436: Interpretation Conflict •

CVE-2018-12357
https://notcve.org/view.php?id=CVE-2018-12357
15 Aug 2019 — Arista CloudVision Portal through 2018.1.1 has Incorrect Permissions. Arista CloudVision Portal versiones hasta 2018.1.1, presenta Permisos Incorrectos. • https://www.arista.com/en/support/advisories-notices • CWE-732: Incorrect Permission Assignment for Critical Resource •