Filtered by vendor Arista
Subscriptions
Total
100 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-6979 | 1 Arista | 1 Ng Firewall | 2025-10-24 | 8.8 High |
| Captive Portal can allow authentication bypass | ||||
| CVE-2025-6980 | 1 Arista | 1 Ng Firewall | 2025-10-24 | 7.5 High |
| Captive Portal can expose sensitive information | ||||
| CVE-2025-6978 | 1 Arista | 1 Ng Firewall | 2025-10-24 | 7.2 High |
| Diagnostics command injection vulnerability | ||||
| CVE-2024-27889 | 1 Arista | 1 Ng Firewall | 2025-10-22 | 8.8 High |
| Multiple SQL Injection vulnerabilities exist in the reporting application of the Arista Edge Threat Management - Arista NG Firewall (NGFW). A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges. | ||||
| CVE-2014-7169 | 17 Apple, Arista, Canonical and 14 more | 90 Mac Os X, Eos, Ubuntu Linux and 87 more | 2025-10-22 | 9.8 Critical |
| GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271. | ||||
| CVE-2014-6271 | 17 Apple, Arista, Canonical and 14 more | 90 Mac Os X, Eos, Ubuntu Linux and 87 more | 2025-10-22 | 9.8 Critical |
| GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. | ||||
| CVE-2024-6387 | 13 Almalinux, Amazon, Apple and 10 more | 85 Almalinux, Amazon Linux, Macos and 82 more | 2025-09-30 | 8.1 High |
| A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | ||||
| CVE-2024-9133 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 6.6 Medium |
| A user with administrator privileges is able to retrieve authentication tokens | ||||
| CVE-2024-9132 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 8.1 High |
| The administrator is able to configure an insecure captive portal script | ||||
| CVE-2024-9131 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 7.2 High |
| A user with administrator privileges can perform command injection | ||||
| CVE-2024-47520 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 7.6 High |
| A user with advanced report application access rights can perform actions for which they are not authorized | ||||
| CVE-2024-47519 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 8.3 High |
| Backup uploads to ETM subject to man-in-the-middle interception | ||||
| CVE-2024-47518 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 6.4 Medium |
| Specially constructed queries targeting ETM could discover active remote access sessions | ||||
| CVE-2024-47517 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 6.8 Medium |
| Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access | ||||
| CVE-2024-9188 | 1 Arista | 1 Ng Firewall | 2025-09-29 | 8.8 High |
| Specially constructed queries cause cross platform scripting leaking administrator tokens | ||||
| CVE-2025-6188 | 1 Arista | 1 Eos | 2025-08-27 | 7.5 High |
| On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do not perform some form of authentication. | ||||
| CVE-2025-3456 | 1 Arista | 1 Eos | 2025-08-26 | 3.8 Low |
| On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-config could then be used to obtain protocol specific passwords in cases where symmetric passwords are required between devices with neighbor protocol relationships. | ||||
| CVE-2024-9448 | 1 Arista | 1 Eos | 2025-08-25 | 7.5 High |
| On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being delivered to unexpected destinations. | ||||
| CVE-2025-2767 | 1 Arista | 1 Ng Firewall | 2025-08-14 | 9.6 Critical |
| Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the processing of the User-Agent HTTP header. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24407. | ||||
| CVE-2025-1260 | 1 Arista | 1 Eos | 2025-06-17 | 9.1 Critical |
| On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in unexpected configuration/operations being applied to the switch. | ||||