
CVE-2023-24510 – On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
https://notcve.org/view.php?id=CVE-2023-24510
05 Jun 2023 — On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart. • https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2021-28510 – For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
https://notcve.org/view.php?id=CVE-2021-28510
24 Jan 2023 — For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable. • https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076 • CWE-400: Uncontrolled Resource Consumption CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2021-28511 – This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches t ...
https://notcve.org/view.php?id=CVE-2021-28511
05 Aug 2022 — This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could allow a host with an IP address in a range that matches the range allowed by a NAT ACL and a range denied by a Security ACL to be forwarded incorrectly as it should have been denied by the Security ACL. This can enable an ACL bypass. E... • https://www.arista.com/en/support/advisories-notices/security-advisory/15862-security-advisory-0078 • CWE-284: Improper Access Control •

CVE-2022-26300
https://notcve.org/view.php?id=CVE-2022-26300
16 Mar 2022 — EOS v2.1.0 was discovered to contain a heap-buffer-overflow via the function txn_test_gen_plugin. Se ha detectado que EOS versión v2.1.0, contenía un desbordamiento del búfer de la pila por medio de la función txn_test_gen_plugin • https://github.com/EOSIO/eos/issues/10820 • CWE-787: Out-of-bounds Write •

CVE-2021-28500 – An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
https://notcve.org/view.php?id=CVE-2021-28500
14 Jan 2022 — An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. Se ha detectado recientemente un problema en Arista EOS donde el uso incorrecto de las API AAA de EOS por parte de los agentes OpenConfig y TerminAttr podría resultar en un acceso no restringido al dispositivo para usuarios locales con una configuración sin contraseña • https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 • CWE-285: Improper Authorization •

CVE-2020-15897
https://notcve.org/view.php?id=CVE-2020-15897
26 Oct 2020 — Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause traffic loss or incorrect forwarding of traffic via a malformed link-state PDU to the IS-IS router. Arista EOS versiones anteriores a 4.21.12M, versiones 4.22.x anteriores a 4.22.7M, versiones 4.23.x anteriores a 4.23.5M y versiones 4.24.x anteriores a 4.24.2F, permite a atacantes remotos causar pérdida de tráfico o reenvío incorrecto de tráfico por medio de una PDU de estado ... • https://www.arista.com/en/support/advisories-notices/security-advisories/11760-security-advisory-54 •

CVE-2019-18948
https://notcve.org/view.php?id=CVE-2019-18948
16 Apr 2020 — An issue was found in Arista EOS. Specific malformed ARP packets can impact the software forwarding of VxLAN packets. This issue is found in Arista’s EOS VxLAN code, which can allow attackers to crash the VxlanSwFwd agent. This affects EOS 4.21.8M and below releases in the 4.21.x train, 4.22.3M and below releases in the 4.22.x train, 4.23.1F and below releases in the 4.23.x train, and all releases in 4.15, 4.16, 4.17, 4.18, 4.19, 4.20 code train. Se encontró un problema en Arista EOS. • https://www.arista.com/en/support/advisories-notices/security-advisories/10292-security-advisory-47 •

CVE-2020-10188 – telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
https://notcve.org/view.php?id=CVE-2020-10188
06 Mar 2020 — utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions. El archivo utility.c en telnetd en netkit telnet versiones hasta 0.17, permite a atacantes remotos ejecutar código arbitrario por medio de escrituras cortas o datos urgentes, debido a un desbordamiento del búfer que involucra a las funciones netclear y nextitem. A vulnerability was found where incorre... • https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2019-17596 – golang: invalid public key causes panic in dsa.Verify
https://notcve.org/view.php?id=CVE-2019-17596
24 Oct 2019 — Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates. Go versiones anteriores a 1.12.11 y versiones 1.3.x anteriores a 1.13.2, puede entrar en pánico tras intentar procesar el tráfico de red que contiene una clave pública DSA no válida. Existen varios escenarios de ataque, tal y como el tráfico de un cliente hacia un s... • https://github.com/pquerna/poc-dsa-verify-CVE-2019-17596 • CWE-295: Improper Certificate Validation CWE-436: Interpretation Conflict •

CVE-2018-14008
https://notcve.org/view.php?id=CVE-2018-14008
15 Aug 2019 — Arista EOS through 4.21.0F allows a crash because 802.1x authentication is mishandled. Arista EOS versiones hasta 4.21.0F, permite un bloqueo porque la autenticación de 802.1x es manejada inapropiadamente. • https://www.arista.com/en/support/advisories-notices • CWE-287: Improper Authentication •