In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66 | Mitigation Vendor Advisory |
https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.2 |
References | () https://www.arista.com/en/support/advisories-notices/security-advisories/12914-security-advisory-66 - Mitigation, Vendor Advisory |
Information
Published : 2021-09-09 13:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28495
Mitre link : CVE-2021-28495
CVE.ORG link : CVE-2021-28495
JSON object : View
Products Affected
arista
- metamako_operating_system
- 7130
CWE
CWE-287
Improper Authentication