In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentially enable authenticated users with read-only access to take actions that are otherwise restricted in the GUI.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.arista.com/en/support/advisories-notices/security-advisories/9001-security-advisory-44 - Vendor Advisory |
Information
Published : 2019-12-19 19:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-18181
Mitre link : CVE-2019-18181
CVE.ORG link : CVE-2019-18181
JSON object : View
Products Affected
arista
- cloudvision_portal
CWE