Vulnerabilities > Arista > EOS > 4.26.2

DATE CVE VULNERABILITY TITLE RISK
2023-06-05 CVE-2023-24510 Improper Handling of Exceptional Conditions vulnerability in Arista EOS
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
network
low complexity
arista CWE-755
7.5
2023-04-25 CVE-2023-24512 Incorrect Authorization vulnerability in Arista products
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch.
network
low complexity
arista CWE-863
6.5
2023-04-13 CVE-2023-24509 Unspecified vulnerability in Arista EOS
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation.
local
low complexity
arista
7.8
2023-04-12 CVE-2023-24511 Memory Leak vulnerability in Arista EOS
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process.
network
low complexity
arista CWE-401
7.5
2023-01-26 CVE-2021-28510 Improper Validation of Specified Quantity in Input vulnerability in Arista EOS
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart.
network
low complexity
arista CWE-1284
7.5
2022-05-26 CVE-2021-28508 Cleartext Transmission of Sensitive Information vulnerability in Arista EOS and Terminattr
This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols.
network
high complexity
arista CWE-319
3.6
2022-05-26 CVE-2021-28509 Cleartext Transmission of Sensitive Information vulnerability in Arista EOS and Terminattr
This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols.
network
high complexity
arista CWE-319
3.6
2022-04-14 CVE-2021-28505 Incorrect Authorization vulnerability in Arista EOS
On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
network
low complexity
arista CWE-863
5.0
2022-04-01 CVE-2021-28504 Incorrect Authorization vulnerability in Arista EOS
On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol field as expected.
network
arista CWE-863
4.3
2022-01-14 CVE-2021-28506 Missing Authorization vulnerability in Arista EOS
An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.
network
low complexity
arista CWE-862
critical
9.4