CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
arista | 704x3 | - | cpe:2.3:h:arista:704x3:-:*:*:*:*:*:*:* |
arista | 7304x | - | cpe:2.3:h:arista:7304x:-:*:*:*:*:*:*:* |
arista | 7304x3 | - | cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:* |
arista | 7308x | - | cpe:2.3:h:arista:7308x:-:*:*:*:*:*:*:* |
arista | 7316x | - | cpe:2.3:h:arista:7316x:-:*:*:*:*:*:*:* |
arista | 7324x | - | cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:* |
arista | 7328x | - | cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:* |
arista | 7504r | - | cpe:2.3:h:arista:7504r:-:*:*:*:*:*:*:* |
arista | 7504r3 | - | cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:* |
arista | 7508r | - | cpe:2.3:h:arista:7508r:-:*:*:*:*:*:*:* |
[
{
"vendor": "Arista Networks",
"product": "Arista EOS",
"versions": [
{
"version": "4.23.0 4.23.13M",
"status": "affected"
},
{
"version": "4.28.0",
"status": "affected",
"lessThanOrEqual": "4.28.3M",
"versionType": "custom"
},
{
"version": "4.27.0",
"status": "affected",
"lessThanOrEqual": "4.27.6M",
"versionType": "custom"
},
{
"version": "4.286.0",
"status": "affected",
"lessThanOrEqual": "4.26.8M",
"versionType": "custom"
},
{
"version": "4.25.0",
"status": "affected",
"lessThanOrEqual": "4.25.9M",
"versionType": "custom"
},
{
"version": "4.24.0",
"status": "affected",
"lessThanOrEqual": "4.24.10M",
"versionType": "custom"
}
]
}
]
More