Vulnerabilities > Arista > EOS > 4.27
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-05-26 | CVE-2021-28508 | Cleartext Transmission of Sensitive Information vulnerability in Arista EOS and Terminattr This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. | 6.1 |
2022-05-26 | CVE-2021-28509 | Cleartext Transmission of Sensitive Information vulnerability in Arista EOS and Terminattr This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. | 6.1 |
2022-04-14 | CVE-2021-28505 | Incorrect Authorization vulnerability in Arista EOS On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol. | 7.5 |
2022-04-01 | CVE-2021-28504 | Incorrect Authorization vulnerability in Arista EOS On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol field as expected. | 7.5 |