| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2021-28508 | TerminAttr streams IPsec sensitive data in clear text to other authorized users in CVP | Arista Networks | Arista EOS | Medium | 6.8 | 2022-05-26 19:48:14 | Deep Dive |
| CVE-2021-28505 | On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol. | Arista Networks | EOS | High | 7.5 | 2022-04-14 20:05:50 | Deep Dive |
| CVE-2021-28504 | On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol fi ... | Arista Networks | EOS | High | 7.5 | 2022-04-01 22:17:50 | Deep Dive |
| CVE-2021-28503 | In Arista's EOS software affected releases, eAPI might skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI. | Arista Networks | Arista EOS | High | 7.4 | 2022-02-04 22:29:28 | Deep Dive |
| CVE-2021-28500 | An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. | Arista Networks | Arista EOS | Critical | 9.1 | 2022-01-14 19:11:36 | Deep Dive |
| CVE-2021-28507 | An issue has recently been discovered in Arista EOS where, under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent. | Arista Networks | EOS | Medium | 5.5 | 2022-01-14 19:04:51 | Deep Dive |
| CVE-2021-28506 | An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device. | Arista Networks | EOS | Critical | 9.1 | 2022-01-14 19:04:50 | Deep Dive |
| CVE-2021-28501 | An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. | Arista Networks | Terminattr | Critical | 9.1 | 2022-01-14 19:04:49 | Deep Dive |
| CVE-2021-28496 | In Arista's EOS software affected releases, the shared secret profiles sensitive configuration might be leaked when displaying output over eAPI or other JSON outputs to authenticated users on the device. | Arista Networks | Arista EOS | Medium | 5.7 | 2021-10-21 16:41:47 | Deep Dive |
| CVE-2021-28494 | Arista Networks MOS 授权问题漏洞 | Arista | Metamako Operating System | Critical | 9.6 | 2021-09-09 12:46:58 | Deep Dive |
| CVE-2021-28493 | Arista Networks MOS 授权问题漏洞 | Arista | Metamako Operating System | High | 8.4 | 2021-09-09 12:45:32 | Deep Dive |
| CVE-2021-28495 | Arista Networks MOS 授权问题漏洞 | Arista | Metamako Operating System | High | 7.2 | 2021-09-09 12:43:57 | Deep Dive |
| CVE-2021-28497 | Arista Networks MOS 安全漏洞 | Arista | Metamako Operating System | Medium | 4.4 | 2021-09-09 12:41:37 | Deep Dive |
| CVE-2021-28499 | Arista Networks MOS 加密问题漏洞 | Arista | Metamako Operating System | Medium | 6.3 | 2021-09-09 12:38:50 | Deep Dive |
| CVE-2021-28498 | Arista Networks MOS 安全漏洞 | Arista | Metamako Operating System | High | 8.7 | 2021-09-09 12:38:21 | Deep Dive |