cvelist/2021/28xxx/CVE-2021-28498.json
2021-09-09 13:00:51 +00:00

109 lines
4.3 KiB
JSON

{
"impact": {
"cvss": {
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"privilegesRequired": "LOW",
"baseSeverity": "HIGH",
"userInteraction": "NONE",
"baseScore": 8.7,
"availabilityImpact": "HIGH",
"version": "3.1",
"scope": "CHANGED",
"integrityImpact": "HIGH",
"confidentialityImpact": "LOW"
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train"
}
]
},
"data_type": "CVE",
"source": {
"discovery": "INTERNAL"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Metamako Operating System",
"version": {
"version_data": [
{
"platform": "Arista 7130 Systems running MOS",
"version_name": "MOS-0.13",
"version_affected": ">=",
"version_value": "MOS-0.13"
},
{
"platform": "Arista 7130 Systems running MOS",
"version_name": "MOS-0.26.7",
"version_affected": "<",
"version_value": "MOS-0.26.7"
},
{
"platform": "Arista 7130 Systems running MOS",
"version_name": "MOS-0.32.0",
"version_affected": "<",
"version_value": "MOS-0.32.0"
}
]
}
}
]
},
"vendor_name": "Arista"
}
]
}
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-255 Credentials Management"
}
]
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to MOS-0.26.7 or MOS-0.32.0\n"
},
{
"lang": "eng",
"value": "Install hotfix stored at https://www.arista.com/assets/data/SecurityAdvisories/SA64-67/SecurityAdvisory64-67-Hotfix-mos-1818-2.0.0-1.11.core2_64.rpm\nFor detailed information about hotfix installation, please see the advisory https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64"
}
],
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64",
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2021-28498",
"ASSIGNER": "psirt@arista.com"
}
}