Vulnerabilities > Arista > EOS > 4.26.1

DATE CVE VULNERABILITY TITLE RISK
2023-06-05 CVE-2023-24510 Improper Handling of Exceptional Conditions vulnerability in Arista EOS
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
network
low complexity
arista CWE-755
7.5
2023-04-25 CVE-2023-24512 Incorrect Authorization vulnerability in Arista products
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch.
network
low complexity
arista CWE-863
6.5
2023-04-13 CVE-2023-24509 Unspecified vulnerability in Arista EOS
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation.
local
low complexity
arista
7.8
2023-04-12 CVE-2023-24511 Memory Leak vulnerability in Arista EOS
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process.
network
low complexity
arista CWE-401
7.5
2023-01-26 CVE-2021-28510 Improper Validation of Specified Quantity in Input vulnerability in Arista EOS
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart.
network
low complexity
arista CWE-1284
7.5
2022-05-26 CVE-2021-28508 Cleartext Transmission of Sensitive Information vulnerability in Arista EOS and Terminattr
This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols.
network
high complexity
arista CWE-319
3.6
2022-05-26 CVE-2021-28509 Cleartext Transmission of Sensitive Information vulnerability in Arista EOS and Terminattr
This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols.
network
high complexity
arista CWE-319
3.6
2022-04-14 CVE-2021-28505 Incorrect Authorization vulnerability in Arista EOS
On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
network
low complexity
arista CWE-863
5.0
2022-04-01 CVE-2021-28504 Incorrect Authorization vulnerability in Arista EOS
On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol field as expected.
network
arista CWE-863
4.3
2022-02-04 CVE-2021-28503 Improper Authentication vulnerability in Arista EOS
The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI.
network
arista CWE-287
6.8