2024-12-08 03:06:42 +00:00

210 lines
6.7 KiB
JSON

{
"id": "CVE-2021-28507",
"sourceIdentifier": "psirt@arista.com",
"published": "2022-01-14T20:15:10.383",
"lastModified": "2024-11-21T05:59:48.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue has recently been discovered in Arista EOS where, under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent."
},
{
"lang": "es",
"value": "Se ha detectado recientemente un problema en Arista EOS donde, bajo determinadas condiciones, la ACL de servicio configurada para OpenConfig gNOI y OpenConfig RESTCONF podr\u00eda saltarse, lo que hace que las peticiones denegadas se reenv\u00eden al agente"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@arista.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"baseScore": 4.9,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "psirt@arista.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.23.0",
"versionEndIncluding": "4.23.9m",
"matchCriteriaId": "37BF0DDF-3D2C-4B74-A71B-4A26CE66584F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.24.0",
"versionEndIncluding": "4.24.7m",
"matchCriteriaId": "3753CA4E-E3ED-43AC-BD9B-0F41C274EE42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.25.0",
"versionEndIncluding": "4.25.3",
"matchCriteriaId": "2DCCC623-E1C2-4E97-B5B4-87B15F596334"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.25.4",
"versionEndIncluding": "4.25.4m",
"matchCriteriaId": "A0144E14-840C-4B5C-9FDF-E090ECC33B9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.25.5",
"versionEndIncluding": "4.25.5.1m",
"matchCriteriaId": "2D8887C7-7FE8-4CBC-BEE9-1F202E626A0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.26.0",
"versionEndIncluding": "4.26.2f",
"matchCriteriaId": "361E664D-9F0D-478D-A2F6-F8001F464B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:4.21.0f:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA321EA-682B-4A73-9503-FBD27008CD81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:4.21.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0E814D-7B50-4A14-BA5D-2E29DD84FAB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:4.21.3f:*:*:*:*:*:*:*",
"matchCriteriaId": "429FD7A6-BB8F-4B57-BC72-D79ADF6E3656"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:4.22.0f:*:*:*:*:*:*:*",
"matchCriteriaId": "9D46ABF9-1F09-43C0-93C4-C9AA7245D0F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arista:eos:4.22.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "0B05A1D5-D833-4E4D-BC39-236F5BFC7918"
}
]
}
]
}
],
"references": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071",
"source": "psirt@arista.com",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}