| CVE-2023-24510 | On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart. | Arista Networks | Arista EOS | High | 7.5 | 2023-06-05 00:00:00 | Deep Dive |
| CVE-2023-24509 | On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading t ... | Arista Networks | Arista EOS | Critical | 9.3 | 2023-04-13 00:00:00 | Deep Dive |
| CVE-2023-24511 | On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. | Arista Networks | EOS | Medium | 5.3 | 2023-04-12 00:00:00 | Deep Dive |
| CVE-2023-24545 | On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. | Arista Networks | EOS | High | 7.5 | 2023-04-12 00:00:00 | Deep Dive |
| CVE-2023-24513 | On affected platforms running Arista CloudEOS a size check bypass issue in the Software Forwarding Engine (Sfe) may allow buffer over reads in later code. Additionally, depending on configured options this may cause a recomputation of the TCP checksum ... | Arista Networks | EOS | Medium | 6.5 | 2023-04-12 00:00:00 | Deep Dive |
| CVE-2023-0452 | Econolite EOS traffic control software 加密问题漏洞 | Econolite | EOS | Critical | 9.8 | 2023-01-26 20:39:38 | Deep Dive |
| CVE-2023-0451 | Econolite EOS traffic control software 访问控制错误漏洞 | Econolite | EOS | High | 7.5 | 2023-01-26 20:37:53 | Deep Dive |
| CVE-2021-28510 | For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable. | Arista Networks | EOS | Medium | 5.3 | 2023-01-24 00:00:00 | Deep Dive |
| CVE-2021-28511 | This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches t ... | Arista Networks | EOS | Medium | 5.8 | 2022-08-05 16:47:32 | Deep Dive |
| CVE-2021-28509 | TerminAttr streams MACsec sensitive data in clear text to other authorized users in CVP | Arista Networks | Arista EOS | Medium | 6.1 | 2022-05-26 19:50:36 | Deep Dive |
| CVE-2021-28508 | TerminAttr streams IPsec sensitive data in clear text to other authorized users in CVP | Arista Networks | Arista EOS | Medium | 6.8 | 2022-05-26 19:48:14 | Deep Dive |
| CVE-2021-28505 | On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol. | Arista Networks | EOS | High | 7.5 | 2022-04-14 20:05:50 | Deep Dive |
| CVE-2021-28504 | On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol fi ... | Arista Networks | EOS | High | 7.5 | 2022-04-01 22:17:50 | Deep Dive |
| CVE-2021-28503 | In Arista's EOS software affected releases, eAPI might skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI. | Arista Networks | Arista EOS | High | 7.4 | 2022-02-04 22:29:28 | Deep Dive |
| CVE-2021-28500 | An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. | Arista Networks | Arista EOS | Critical | 9.1 | 2022-01-14 19:11:36 | Deep Dive |
| CVE-2021-28507 | An issue has recently been discovered in Arista EOS where, under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent. | Arista Networks | EOS | Medium | 5.5 | 2022-01-14 19:04:51 | Deep Dive |
| CVE-2021-28506 | An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device. | Arista Networks | EOS | Critical | 9.1 | 2022-01-14 19:04:50 | Deep Dive |
| CVE-2021-28496 | In Arista's EOS software affected releases, the shared secret profiles sensitive configuration might be leaked when displaying output over eAPI or other JSON outputs to authenticated users on the device. | Arista Networks | Arista EOS | Medium | 5.7 | 2021-10-21 16:41:47 | Deep Dive |
| CVE-2019-6001 | Canon EOS系列和PowerShot系列电子摄像头缓冲区错误漏洞 | Canon, Inc. | EOS series digital cameras, PowerShot SX740 HS, PowerShot SX70 HS, and PowerShot G5XmarkⅡ | 中危 | - | 2019-08-06 18:41:11 | Deep Dive |
| CVE-2019-6000 | Canon EOS系列和PowerShot系列电子摄像头缓冲区错误漏洞 | Canon, Inc. | EOS series digital cameras, PowerShot SX740 HS, PowerShot SX70 HS, and PowerShot G5XmarkⅡ | 高危 | - | 2019-08-06 18:41:11 | Deep Dive |