An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 | Exploit Mitigation Patch Vendor Advisory |
Configurations
History
14 Jul 2022, 18:38
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
28 Jan 2022, 21:02
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 - Exploit, Mitigation, Patch, Vendor Advisory |
22 Jan 2022, 01:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:arista:terminattr:*:*:*:*:*:*:*:* | |
CWE | CWE-863 | |
References | (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.8 |
14 Jan 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-14 20:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-28501
Mitre link : CVE-2021-28501
CVE.ORG link : CVE-2021-28501
JSON object : View
Products Affected
arista
- terminattr
CWE