"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-01-10 22:00:58 +00:00
parent 144b5843cb
commit 0f19b2e0f2
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
14 changed files with 1268 additions and 32 deletions

View File

@ -1,17 +1,137 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-47517",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1230",
"cweId": "CWE-1230"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14754"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<ol><li>Log into Edge Threat Management (ETM).</li><li>Go to Appliances, and click your target NGFW.</li><li>On the NGFW appliance page, click Remote Access.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-6.png\"></p></li><li>With the NGFW UI in a new tab or window, let the connection expire. &nbsp;</li><li>After the session has expired, any attempt to perform actions will notify you of the need to enable Remote Access again.</li></ol><br>"
}
],
"value": "* Log into Edge Threat Management (ETM).\n * Go to Appliances, and click your target NGFW.\n * On the NGFW appliance page, click Remote Access.\n\n\n * With the NGFW UI in a new tab or window, let the connection expire. \u00a0\n * After the session has expired, any attempt to perform actions will notify you of the need to enable Remote Access again."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">After you have completed NGFW operations with Remote Access, close the browser window or tab.</span><br>"
}
],
"value": "After you have completed NGFW operations with Remote Access, close the browser window or tab."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"credits": [
{
"lang": "en",
"value": "Mehmet INCE from PRODAFT.com"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,131 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-47518",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Specially constructed queries targeting ETM could discover active remote access sessions"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-552",
"cweId": "CWE-552"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14626"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<ol><li>Log into Edge Threat Management (ETM).</li><li>Go to Appliances, and click your target NGFW.</li><li>On the NGFW appliance page, click Remote Access.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-6.png\"></p></li><li>Leave the connection running.</li></ol><br>"
}
],
"value": "* Log into Edge Threat Management (ETM).\n * Go to Appliances, and click your target NGFW.\n * On the NGFW appliance page, click Remote Access.\n\n\n * Leave the connection running."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">After you have completed your Remote Access session, close the NGFW window.</span><br>"
}
],
"value": "After you have completed your Remote Access session, close the NGFW window."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,137 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-47519",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Backup uploads to ETM subject to man-in-the-middle interception"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-322",
"cweId": "CWE-322"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14708"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<ol><li>As the NGFW administrator, log into the user interface and navigate to the Apps and Services page.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-8.png\"></p></li><li>If you do not see the Configuration Backup service application, it is not installed and the system is not vulnerable.</li><li>Click the Configuration Backup application</li><li>If you see the status that <b>Configuration Backup is disabled</b>, the system is not vulnerable.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-9.png\"></p></li><li>Click the Cloud tab.</li><li>Click Backup Now.</li><li>Log into Edge Threat Management.</li><li>Go to Appliances and Backups.</li><li>Verify that you see a new backup.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-10.png\"></p></li></ol><br>"
}
],
"value": "* As the NGFW administrator, log into the user interface and navigate to the Apps and Services page.\n\n\n * If you do not see the Configuration Backup service application, it is not installed and the system is not vulnerable.\n * Click the Configuration Backup application\n * If you see the status that Configuration Backup is disabled, the system is not vulnerable.\n\n\n * Click the Cloud tab.\n * Click Backup Now.\n * Log into Edge Threat Management.\n * Go to Appliances and Backups.\n * Verify that you see a new backup."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">Disable Configuration Backup application.</span><br>"
}
],
"value": "Disable Configuration Backup application."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"credits": [
{
"lang": "en",
"value": "Mehmet INCE from PRODAFT.com"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,135 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7142",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "On Arista CloudVision Appliance (CVA) affected releases running on appliances that support hardware disk encryption (DCA-350E-CV only), the disk encryption might not be successfully performed. This results in the disks remaining unsecured and data on them"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-311",
"cweId": "CWE-311"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "CloudVision Appliance",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.0.2"
},
{
"version_affected": "<=",
"version_name": "6.0.0",
"version_value": "6.0.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "104",
"defect": [
"BUG 984230"
],
"discovery": "INTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>Systems are affected if disk encryption has been enabled using the <b>cva disk encryption enable</b>&nbsp;command. Whether a system is currently in the affected configuration can be determined with the following steps.</p><h4>Preliminary steps</h4><p>To run the checks described below, it is necessary to run the <b>racadm</b>&nbsp;tool in the privileged mode. The tool is available under the <b>racadm</b>&nbsp;command in CVA version 5 and 6.</p><p>The user will need to know the Fully Qualified Device Descriptor (FQDD) of the RAID controller(s) and the virtual disks. These can be retrieved with the following commands.</p><ul><li>To get the list of FQDD of the RAID controllers, use <b>racadm storage get controllers</b>.<br>The RAID controller(s) will be listed among the others.<div>&nbsp;</div></li><li>To get the list of FQDD of the virtual disks, run <b>racadm storage get vdisks</b>&nbsp;.</li></ul><p>The following is an example from a running a system:</p><pre>[root@cv ~]# racadm storage get controllers\nRAID.SL.3-1\nAHCI.Embedded.2-1\nAHCI.Embedded.1-1\n \n[root@cv ~]# racadm storage get vdisks\nDisk.Virtual.239:RAID.SL.3-1\nDisk.Virtual.238:RAID.SL.3-1\n</pre><p>Adding the <b>-o</b>&nbsp;key to both of these commands will output the properties against each device which include the name and the security status. In addition, the -p option allows the user to query a specific set of properties of the devices. Check <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.dell.com/support\">https://www.dell.com/support</a>&nbsp;for further details on the <b>racadm</b>&nbsp;command and its options.</p><br>"
}
],
"value": "Systems are affected if disk encryption has been enabled using the cva disk encryption enable\u00a0command. Whether a system is currently in the affected configuration can be determined with the following steps.\n\nPreliminary stepsTo run the checks described below, it is necessary to run the racadm\u00a0tool in the privileged mode. The tool is available under the racadm\u00a0command in CVA version 5 and 6.\n\nThe user will need to know the Fully Qualified Device Descriptor (FQDD) of the RAID controller(s) and the virtual disks. These can be retrieved with the following commands.\n\n * To get the list of FQDD of the RAID controllers, use racadm storage get controllers.\nThe RAID controller(s) will be listed among the others.\u00a0\n\n\n * To get the list of FQDD of the virtual disks, run racadm storage get vdisks\u00a0.\n\n\nThe following is an example from a running a system:\n\n[root@cv ~]# racadm storage get controllers\nRAID.SL.3-1\nAHCI.Embedded.2-1\nAHCI.Embedded.1-1\n \n[root@cv ~]# racadm storage get vdisks\nDisk.Virtual.239:RAID.SL.3-1\nDisk.Virtual.238:RAID.SL.3-1\n\n\nAdding the -o\u00a0key to both of these commands will output the properties against each device which include the name and the security status. In addition, the -p option allows the user to query a specific set of properties of the devices. Check https://www.dell.com/support \u00a0for further details on the racadm\u00a0command and its options."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>To manually fix the issue on a vulnerable system determined by following the steps depicted in the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-2\">Determining a vulnerable device</a>&nbsp;section, run the following commands to enable the encryption of the virtual disks. The FQDD of the RAID controller(s) and virtual disks will be needed for this mitigation. See the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-3\">Preliminary steps</a>&nbsp;section on how to retrieve them. Note as the security key was set before on this vulnerable system, it is not needed to set it again here. Please see the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-4\">Caveats</a>&nbsp;section for more information.</p><p>Generally, the overall process takes up to 10 minutes. The performance of a running system is not expected to degrade when the following steps are carried out.</p><ol><li>Encrypt all virtual disks that belong to the RAID controller by running the following command for each of them:<br><pre>racadm storage encryptvd:&lt;virtual drive FQDD&gt;</pre><div>&nbsp;</div></li><li>Create the job for the RAID controller and monitor its progress:<br><pre>racadm jobqueue create &lt;RAID controller FQDD&gt; --realtime</pre><div>&nbsp;</div>This command must return the scheduled configuration job ID in its output. Look for <b>Commit JID = JID_xxxxx </b>in the output.<br>Then check the status of this job with <b>racadm jobqueue view -i &lt;jobId&gt;</b>. It will take up to 10 minutes to complete.<div>&nbsp;</div></li><li>After the job is complete, run the following command to see if all the virtual disks are encrypted.<br><pre>racadm storage get vdisks --refkey &lt;RAID controller FQDD&gt; -o</pre><p>The output should show<b>&nbsp;Secured = YES</b>&nbsp;against each one of them.</p></li></ol><p>The following is an example of the aforementioned steps.</p><pre>[root@cv ~]# <b>racadm storage encryptvd:Disk.Virtual.238:RAID.SL.3-1</b>\nSTOR094 : The storage configuration operation is successfully completed\nand the change is in pending state.\n&lt;--snip\u2014-&gt;\n \n[root@cv ~]# <b>racadm jobqueue create RAID.SL.3-1 --realtime</b>\nRAC1024: Successfully scheduled a job.\nVerify the job status using \"racadm jobqueue view -i JID_xxxxx\" command.\nCommit JID = JID_218438865303\n \n[root@cv ~]# <b>racadm jobqueue view -i JID_218438865303</b>\n---------------------------- JOB -------------------------\n[Job ID=JID_218438865303]\nJob Name=Configure: RAID.SL.3-1\n<b>Status=Running</b>\n&lt;--snip\u2014-&gt;\n<b>Percent Complete=[1]</b>\n \n[root@cv ~]# <b>racadm jobqueue view -i JID_218438865303</b>\n---------------------------- JOB -------------------------\n[Job ID=JID_218438865303]\nJob Name=Configure: RAID.SL.3-1\n<b>Status=Completed</b>\n&lt;--snip\u2014-&gt;\n<b>Percent Complete=[100]</b>\n \n[root@cv ~]# <b>racadm storage get vdisks --refkey RAID.SL.3-1 -o</b>\n \nDisk.Virtual.238:RAID.SL.3-1\n&nbsp; &nbsp;Status &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = Ok\n&nbsp; &nbsp;DeviceDescription &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = Virtual Disk 238 on RAID Controller in SL 3\n&nbsp; &nbsp;Name &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = os\n&lt;--snip\u2014-&gt;\n&nbsp; <b>&nbsp;Secured &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = YES</b>\n&lt;--snip\u2014-&gt;\n&nbsp; &nbsp;\nDisk.Virtual.239:RAID.SL.3-1\n&nbsp; &nbsp;Status &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = Ok\n&nbsp; &nbsp;DeviceDescription &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = Virtual Disk 239 on RAID Controller in SL 3\n&nbsp; &nbsp;Name &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = data\n&lt;--snip\u2014-&gt;\n<b>&nbsp; &nbsp;Secured &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; = YES</b>\n&lt;--snip\u2014-&gt;</pre><br>"
}
],
"value": "To manually fix the issue on a vulnerable system determined by following the steps depicted in the Determining a vulnerable device https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-2 \u00a0section, run the following commands to enable the encryption of the virtual disks. The FQDD of the RAID controller(s) and virtual disks will be needed for this mitigation. See the Preliminary steps https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-3 \u00a0section on how to retrieve them. Note as the security key was set before on this vulnerable system, it is not needed to set it again here. Please see the Caveats https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-4 \u00a0section for more information.\n\nGenerally, the overall process takes up to 10 minutes. The performance of a running system is not expected to degrade when the following steps are carried out.\n\n * Encrypt all virtual disks that belong to the RAID controller by running the following command for each of them:\nracadm storage encryptvd:<virtual drive FQDD>\n\n\u00a0\n\n\n * Create the job for the RAID controller and monitor its progress:\nracadm jobqueue create <RAID controller FQDD> --realtime\n\n\u00a0\n\nThis command must return the scheduled configuration job ID in its output. Look for Commit JID = JID_xxxxx in the output.\nThen check the status of this job with racadm jobqueue view -i <jobId>. It will take up to 10 minutes to complete.\u00a0\n\n\n * After the job is complete, run the following command to see if all the virtual disks are encrypted.\nracadm storage get vdisks --refkey <RAID controller FQDD> -o\n\nThe output should show\u00a0Secured = YES\u00a0against each one of them.\n\n\nThe following is an example of the aforementioned steps.\n\n[root@cv ~]# racadm storage encryptvd:Disk.Virtual.238:RAID.SL.3-1\nSTOR094 : The storage configuration operation is successfully completed\nand the change is in pending state.\n<--snip\u2014->\n \n[root@cv ~]# racadm jobqueue create RAID.SL.3-1 --realtime\nRAC1024: Successfully scheduled a job.\nVerify the job status using \"racadm jobqueue view -i JID_xxxxx\" command.\nCommit JID = JID_218438865303\n \n[root@cv ~]# racadm jobqueue view -i JID_218438865303\n---------------------------- JOB -------------------------\n[Job ID=JID_218438865303]\nJob Name=Configure: RAID.SL.3-1\nStatus=Running\n<--snip\u2014->\nPercent Complete=[1]\n \n[root@cv ~]# racadm jobqueue view -i JID_218438865303\n---------------------------- JOB -------------------------\n[Job ID=JID_218438865303]\nJob Name=Configure: RAID.SL.3-1\nStatus=Completed\n<--snip\u2014->\nPercent Complete=[100]\n \n[root@cv ~]# racadm storage get vdisks --refkey RAID.SL.3-1 -o\n \nDisk.Virtual.238:RAID.SL.3-1\n\u00a0 \u00a0Status \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = Ok\n\u00a0 \u00a0DeviceDescription \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = Virtual Disk 238 on RAID Controller in SL 3\n\u00a0 \u00a0Name \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = os\n<--snip\u2014->\n\u00a0 \u00a0Secured \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = YES\n<--snip\u2014->\n\u00a0 \u00a0\nDisk.Virtual.239:RAID.SL.3-1\n\u00a0 \u00a0Status \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = Ok\n\u00a0 \u00a0DeviceDescription \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = Virtual Disk 239 on RAID Controller in SL 3\n\u00a0 \u00a0Name \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = data\n<--snip\u2014->\n\u00a0 \u00a0Secured \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 = YES\n<--snip\u2014->"
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.</p><p>For more information about upgrading see <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/qsg-cva-350e-cv\">CloudVision Appliance 350E-CV - Arista</a>.</p><div>&nbsp;</div><div>CVE-2024-7142 has been fixed in the following releases:</div><ul><li>CVA 6.0.7</li></ul><p>If the user runs the <b>cva disk encryption enable</b>&nbsp;command in the aforementioned releases containing the fix, the disks will be properly encrypted.</p><p>In addition, the upgrade from a vulnerable CVA version to the versions mentioned above will fix the issue automatically.</p><ul><li>If the key/password pair is found during the upgrade, the upgrade process will encrypt the disks properly. Just to be clear, if this upgrade process <i>does not notice</i>&nbsp;the corresponding key/password pair on the system, it will preserve the original intent of the user and <i>will not </i>encrypt the disks.<div>&nbsp;</div></li><li>If the user no longer wants to encrypt the disks even though they previously ran <b>cva disk encryption enable </b>command on a vulnerable release, <b>cva disk encryption disable</b>&nbsp;command must be run <i>before the upgrade. </i>This <b>disable</b>&nbsp;option will not be available on the new releases</li></ul><br>"
}
],
"value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nFor more information about upgrading see CloudVision Appliance 350E-CV - Arista https://www.arista.com/en/qsg-cva-350e-cv .\n\n\u00a0\n\nCVE-2024-7142 has been fixed in the following releases:\n\n * CVA 6.0.7\n\n\nIf the user runs the cva disk encryption enable\u00a0command in the aforementioned releases containing the fix, the disks will be properly encrypted.\n\nIn addition, the upgrade from a vulnerable CVA version to the versions mentioned above will fix the issue automatically.\n\n * If the key/password pair is found during the upgrade, the upgrade process will encrypt the disks properly. Just to be clear, if this upgrade process does not notice\u00a0the corresponding key/password pair on the system, it will preserve the original intent of the user and will not encrypt the disks.\u00a0\n\n\n * If the user no longer wants to encrypt the disks even though they previously ran cva disk encryption enable command on a vulnerable release, cva disk encryption disable\u00a0command must be run before the upgrade. This disable\u00a0option will not be available on the new releases"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,137 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-9131",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A user with administrator privileges can perform command injection"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-88",
"cweId": "CWE-88"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14800"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">No required configuration.</span><br>"
}
],
"value": "No required configuration."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">No known mitigation.</span><br>"
}
],
"value": "No known mitigation."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"credits": [
{
"lang": "en",
"value": "Mehmet INCE from PRODAFT.com"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,137 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-9132",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The administrator is able to configure an insecure captive portal script"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14744"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<ol><li>As the NGFW administrator, log into the user interface and navigate to the Apps and Services page.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-1.png\"></p></li><li>If you do not see the Captive Portal application, it is not installed and the system is not </li><li>vulnerable.</li><li>Click the Captive Portal application</li><li>If you see the status that <b>Captive Portal is disabled</b>, the system is not vulnerable.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-2.png\"></p></li><li>Click the Captive Page tab.</li><li>If the Custom radio button is not selected, the system is not vulnerable.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-3.png\"></p></li></ol><p>An example of a vulnerable page (The \u201cCustom\u201d radio button is selected)</p><br><br>"
}
],
"value": "* As the NGFW administrator, log into the user interface and navigate to the Apps and Services page.\n\n\n * If you do not see the Captive Portal application, it is not installed and the system is not \n * vulnerable.\n * Click the Captive Portal application\n * If you see the status that Captive Portal is disabled, the system is not vulnerable.\n\n\n * Click the Captive Page tab.\n * If the Custom radio button is not selected, the system is not vulnerable.\n\n\nAn example of a vulnerable page (The \u201cCustom\u201d radio button is selected)"
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>Disable custom page.</div><ol><li>As the NGFW administrator, log into the UI and navigate to the Captive Portal application.</li><li>Select either \u201c<i>Basic Message</i>\u201d or \u201c<i>Basic Login\u201d</i></li><li>Click Save.</li></ol><br>"
}
],
"value": "Disable custom page.\n\n * As the NGFW administrator, log into the UI and navigate to the Captive Portal application.\n * Select either \u201cBasic Message\u201d or \u201cBasic Login\u201d\n * Click Save."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"credits": [
{
"lang": "en",
"value": "Mehmet INCE from PRODAFT.com"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,137 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-9133",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A user with administrator privileges is able to retrieve authentication tokens"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287",
"cweId": "CWE-287"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14800"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">No required configuration.</span><br>"
}
],
"value": "No required configuration."
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: rgb(255, 255, 255);\">No known mitigation.</span><br>"
}
],
"value": "No known mitigation."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"credits": [
{
"lang": "en",
"value": "Mehmet INCE from PRODAFT.com"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,137 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-9134",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "psirt@arista.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Multiple SQL Injection vulnerabilities exist in the reporting application. A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Arista Networks",
"product": {
"product_data": [
{
"product_name": "Arista Edge Threat Management",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "17.1.0",
"version_value": "17.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "105",
"defect": [
"NGFW-14721"
],
"discovery": "EXTERNAL"
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>If the NGFW has one or more Report application Report Users with Online Access enabled they are vulnerable.</p><div>&nbsp;</div><div>To access this information:</div><ol><li>As the NGFW administrator, log into the UI and navigate to the Reports application.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-4.png\"></p></li></ol><p>The above picture shows the configuration panel for user access. The \u201c<a target=\"_blank\" rel=\"nofollow\">reportuser@domain.com</a>\u201d user has \u201cOnline Access\u201d checked, which is required in order to be vulnerable.</p><h4>Indicators of Compromise</h4><p>Any compromise will reveal itself via the postgres user running a non-standard postgres process. &nbsp;</p><p>For example, an appropriate process list for running the postgres database will look like:</p><pre># ps -u postgres -f\nUID &nbsp; &nbsp; &nbsp; &nbsp; PID &nbsp; PPID C STIME TTY &nbsp; &nbsp; &nbsp; &nbsp; TIME CMD\npostgres 94057 &nbsp; &nbsp; 1 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:00 /usr/lib/postgresql/13/bin/postgres -D /var/lib/postgresql/13/main -c config_file=/etc/postgresql/13/main/postgresql.conf\npostgres 94063 94057 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:02 postgres: 13/main: checkpointer\npostgres 94064 94057 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:00 postgres: 13/main: background writer\npostgres 94065 94057 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:12 postgres: 13/main: walwriter\npostgres 94066 94057 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:00 postgres: 13/main: autovacuum launcher\npostgres 94067 94057 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:01 postgres: 13/main: stats collector\npostgres 94068 94057 0 Feb06 ? &nbsp; &nbsp; &nbsp; 00:00:00 postgres: 13/main: logical replication launcher\n</pre><div>&nbsp;</div><p>Additional processes run by the postgres user indicating a potential compromise may look like:</p><pre>postgres 100172 100171 0 Feb06 pts/2 &nbsp; 00:00:00 bash</pre><br>"
}
],
"value": "If the NGFW has one or more Report application Report Users with Online Access enabled they are vulnerable.\n\n\u00a0\n\nTo access this information:\n\n * As the NGFW administrator, log into the UI and navigate to the Reports application.\n\n\nThe above picture shows the configuration panel for user access. The \u201creportuser@domain.com\u201d user has \u201cOnline Access\u201d checked, which is required in order to be vulnerable.\n\nIndicators of CompromiseAny compromise will reveal itself via the postgres user running a non-standard postgres process. \u00a0\n\nFor example, an appropriate process list for running the postgres database will look like:\n\n# ps -u postgres -f\nUID \u00a0 \u00a0 \u00a0 \u00a0 PID \u00a0 PPID C STIME TTY \u00a0 \u00a0 \u00a0 \u00a0 TIME CMD\npostgres 94057 \u00a0 \u00a0 1 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:00 /usr/lib/postgresql/13/bin/postgres -D /var/lib/postgresql/13/main -c config_file=/etc/postgresql/13/main/postgresql.conf\npostgres 94063 94057 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:02 postgres: 13/main: checkpointer\npostgres 94064 94057 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:00 postgres: 13/main: background writer\npostgres 94065 94057 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:12 postgres: 13/main: walwriter\npostgres 94066 94057 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:00 postgres: 13/main: autovacuum launcher\npostgres 94067 94057 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:01 postgres: 13/main: stats collector\npostgres 94068 94057 0 Feb06 ? \u00a0 \u00a0 \u00a0 00:00:00 postgres: 13/main: logical replication launcher\n\n\n\u00a0\n\nAdditional processes run by the postgres user indicating a potential compromise may look like:\n\npostgres 100172 100171 0 Feb06 pts/2 \u00a0 00:00:00 bash"
}
],
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>For the Reports application, for all Reports Users, disable <i>Online Access.</i></p><p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-5.png\"></p><div>To do this:</div><ol><li>As the NGFW administrator, log into the UI and go to the Reports application.</li><li>For all users with the <i>Online Access</i>&nbsp;checkbox (red box) enabled, uncheck it.</li><li>Click Save.</li></ol><br>"
}
],
"value": "For the Reports application, for all Reports Users, disable Online Access.\n\n\n\nTo do this:\n\n * As the NGFW administrator, log into the UI and go to the Reports application.\n * For all users with the Online Access\u00a0checkbox (red box) enabled, uncheck it.\n * Click Save."
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"
}
],
"value": "The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n * 17.2 Upgrade"
}
],
"credits": [
{
"lang": "en",
"value": "Mehmet INCE from PRODAFT.com"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-23108",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-23109",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2025-23110",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in REDCap 14.9.6. A Reflected cross-site scripting (XSS) vulnerability in the email-subject field exists while performing an upload of a CSV file containing a list of alert configurations. An attacker can send the victim a CSV file containing the XSS payload in the email-subject. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim clicks on the email-subject value, it triggers the XSS payload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_VVVVVV/README.md",
"refsource": "MISC",
"name": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_VVVVVV/README.md"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2025-23111",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in REDCap 14.9.6. It allows HTML Injection via the Survey field name, exposing users to a redirection to a phishing website. An attacker can exploit this to trick the user that receives the survey into clicking on the field name, which redirects them to a phishing website. Thus, this allows malicious actions to be executed without user consent."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_YYYY/README.md",
"refsource": "MISC",
"name": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_YYYY/README.md"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2025-23112",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in REDCap 14.9.6. A stored cross-site scripting (XSS) vulnerability allows authenticated users to inject malicious scripts into the Survey field name of Survey. When a user receive the survey, if he clicks on the field name, it triggers the XSS payload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_ZZZZ/README.md",
"refsource": "MISC",
"name": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_ZZZZ/README.md"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2025-23113",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in REDCap 14.9.6. It has an action=myprojects&logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_XXX/README.md",
"refsource": "MISC",
"name": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/blob/main/RedCap/CVE_XXX/README.md"
}
]
}
}