// For flags

CVE-2021-28496

In Arista's EOS software affected releases, the shared secret profiles sensitive configuration might be leaked when displaying output over eAPI or other JSON outputs to authenticated users on the device.

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.22.x train, 4.23.9 and below releases in the 4.23.x train, 4.24.7 and below releases in the 4.24.x train, 4.25.4 and below releases in the 4.25.x train, 4.26.1 and below releases in the 4.26.x train

En los sistemas que ejecutan Arista EOS y CloudEOS con la versión afectada, cuando son usados perfiles de secreto compartido, la contraseña configurada para su uso por BiDirectional Forwarding Detection (BFD) será filtrada cuando es mostrada la salida a través de eAPI u otras salidas JSON a otros usuarios autenticados en el dispositivo. Las Versiones de EOS afectadas son: todas las versiones 4.22.x train, versiones 4.23.9 y por debajo del train 4.23.x, versiones 4.24.7 y por debajo del train 4.24.x, versiones 4.25.4 y por debajo del train 4.25.x, versiones 4.26.1 y por debajo del train 4.26.x

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-03-16 CVE Reserved
  • 2021-10-21 CVE Published
  • 2023-05-14 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-311: Missing Encryption of Sensitive Data
  • CWE-522: Insufficiently Protected Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arista
Search vendor "Arista"
Eos
Search vendor "Arista" for product "Eos"
>= 4.22 <= 4.22.7m
Search vendor "Arista" for product "Eos" and version " >= 4.22 <= 4.22.7m"
-
Affected
Arista
Search vendor "Arista"
Eos
Search vendor "Arista" for product "Eos"
>= 4.23 < 4.23.10
Search vendor "Arista" for product "Eos" and version " >= 4.23 < 4.23.10"
-
Affected
Arista
Search vendor "Arista"
Eos
Search vendor "Arista" for product "Eos"
>= 4.24 < 4.24.8
Search vendor "Arista" for product "Eos" and version " >= 4.24 < 4.24.8"
-
Affected
Arista
Search vendor "Arista"
Eos
Search vendor "Arista" for product "Eos"
>= 4.25 < 4.25.5
Search vendor "Arista" for product "Eos" and version " >= 4.25 < 4.25.5"
-
Affected
Arista
Search vendor "Arista"
Eos
Search vendor "Arista" for product "Eos"
>= 4.26 < 4.26.2
Search vendor "Arista" for product "Eos" and version " >= 4.26 < 4.26.2"
-
Affected