"value":"Multiple SQL Injection vulnerabilities exist in the reporting application of the Arista Edge Threat Management - Arista NG Firewall (NGFW). A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges.\n"
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId":"CWE-89"
}
]
}
]
},
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"Arista Networks",
"product":{
"product_data":[
{
"product_name":"Arista Edge Threat Management - Arista NG Firewall (NGFW)",
"value":"<span style=\"background-color: rgb(255, 255, 255);\">If the NGFW has one or more Report application Report Users with Online Access enabled they are vulnerable.</span><br>"
}
],
"value":"If the NGFW has one or more Report application Report Users with Online Access enabled they are vulnerable.\n"
}
],
"work_around":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"<span style=\"background-color: rgb(255, 255, 255);\">For the Reports application, for all Reports Users, disable </span><i>Online Access.<br><p>To do this:</p><p><b>2.</b> As the NGFW administrator, log into the UI and go to the Reports application.</p><p><b>3.</b> For all users with the Online Access checkbox (red box) enabled, uncheck it.</p><p><b>4.</b> Click Save.</p><br></i><br>"
}
],
"value":"For the Reports application, for all Reports Users, disable Online Access.\nTo do this:\n\n2.\u00a0As the NGFW administrator, log into the UI and go to the Reports application.\n\n3.\u00a0For all users with the Online Access checkbox (red box) enabled, uncheck it.\n\n4.\u00a0Click Save.\n\n\n\n"
}
],
"exploit":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"Arista is not aware of any exploitation of this vulnerability in customer networks."
}
],
"value":"Arista is not aware of any exploitation of this vulnerability in customer networks."
}
],
"solution":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"<p>The recommended resolution is to upgrade to the version indicated below and apply the hotfix at your earliest convenience.</p><ul><li>17.1 Upgrade</li><li>17.0 (requires Hotfix)<br><div> </div>To resolve click the following link for instructions to either upgrading or apply a hotfix patch:<br><a target=\"_blank\" rel=\"nofollow\" href=\"https://wiki.edge.arista.com/index.php/Patch_-_Report_vulnerability\">Click here for the hotfix and instructions on resolving this issue</a></li></ul>"
}
],
"value":"The recommended resolution is to upgrade to the version indicated below and apply the hotfix at your earliest convenience.\n\n * 17.1 Upgrade\n * 17.0 (requires Hotfix)\n\u00a0\n\nTo resolve click the following link for instructions to either upgrading or apply a hotfix patch:\n Click here for the hotfix and instructions on resolving this issue https://wiki.edge.arista.com/index.php/Patch_-_Report_vulnerability \n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"Arista would like to acknowledge and thank Gereon Huppertz, working with Trend Micro's Zero Day Initiative for responsibly reporting CVE-2024-27889"