### [CVE-2021-28506](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28506) ![](https://img.shields.io/static/v1?label=Product&message=EOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.24.7M%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.25.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.25.4M%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.25.5.1M%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.26.2F%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-285%20Improper%20Authorization&color=brightgreen) ### Description An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device. ### POC #### Reference - https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 #### Github No PoCs found on GitHub currently.