Arista

Cloudvision Portal

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Medienbericht Exploit
  • EPSS 2.57%
  • Veröffentlicht 22.04.2026 08:15:10
  • Zuletzt bearbeitet 12.05.2026 16:15:00

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-pl...

  • EPSS 0.17%
  • Veröffentlicht 08.05.2025 19:15:57
  • Zuletzt bearbeitet 15.04.2026 00:35:42

On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent over the secure Vxlan tunnels in the clear.

  • EPSS 0.35%
  • Veröffentlicht 08.05.2025 18:47:52
  • Zuletzt bearbeitet 15.04.2026 00:35:42

On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run o...

  • EPSS 0.3%
  • Veröffentlicht 08.05.2025 18:37:13
  • Zuletzt bearbeitet 15.04.2026 00:35:42

On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system ...

  • EPSS 0.16%
  • Veröffentlicht 13.06.2023 21:15:09
  • Zuletzt bearbeitet 06.01.2025 16:15:25

On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within t...

  • EPSS 0.05%
  • Veröffentlicht 05.08.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:58:26

This advisory documents an internally found vulnerability in the on premises deployment model of Arista CloudVision Portal (CVP) where under a certain set of conditions, user passwords can be leaked in the Audit and System logs. The impact of this vu...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 22.09.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 05:14:36

A vulnerability in Arista’s CloudVision Portal (CVP) prior to 2020.2 allows users with “read-only” or greater access rights to the Configlet Management module to download files not intended for access, located on the CVP server, by accessing a specif...

  • EPSS 1.24%
  • Veröffentlicht 06.06.2020 19:15:09
  • Zuletzt bearbeitet 21.11.2024 05:02:04

In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.

  • EPSS 0.04%
  • Veröffentlicht 19.12.2019 19:15:14
  • Zuletzt bearbeitet 21.11.2024 04:32:46

In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentia...

  • EPSS 0.1%
  • Veröffentlicht 19.12.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:33:22

In CloudVision Portal (CVP) for all releases in the 2018.2 Train, under certain conditions, the application logs user passwords in plain text for certain API calls, potentially leading to user password exposure. This only affects CVP environments whe...