Vulnerabilities > Arista > EOS > High

DATE CVE VULNERABILITY TITLE RISK
2023-08-29 CVE-2023-3646 Out-of-bounds Read vulnerability in Arista EOS
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
network
low complexity
arista CWE-125
7.5
2023-06-05 CVE-2023-24510 Improper Handling of Exceptional Conditions vulnerability in Arista EOS
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
network
low complexity
arista CWE-755
7.5
2023-04-13 CVE-2023-24509 Unspecified vulnerability in Arista EOS
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation.
local
low complexity
arista
7.8
2023-04-12 CVE-2023-24511 Memory Leak vulnerability in Arista EOS
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process.
network
low complexity
arista CWE-401
7.5
2023-01-26 CVE-2021-28510 Improper Validation of Specified Quantity in Input vulnerability in Arista EOS
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart.
network
low complexity
arista CWE-1284
7.5
2022-04-14 CVE-2021-28505 Incorrect Authorization vulnerability in Arista EOS
On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
network
low complexity
arista CWE-863
7.5
2022-04-01 CVE-2021-28504 Incorrect Authorization vulnerability in Arista EOS
On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol field as expected.
network
low complexity
arista CWE-863
7.5
2022-01-14 CVE-2021-28500 Unspecified vulnerability in Arista EOS
An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
local
low complexity
arista
7.8
2022-01-14 CVE-2021-28507 Unspecified vulnerability in Arista EOS
An issue has recently been discovered in Arista EOS where, under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent.
network
low complexity
arista
7.1
2020-12-28 CVE-2020-24360 Improper Resource Shutdown or Release vulnerability in Arista EOS
An issue with ARP packets in Arista’s EOS affecting the 7800R3, 7500R3, and 7280R3 series of products may result in issues that cause a kernel crash, followed by a device reload.
low complexity
arista CWE-404
7.4