Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15179 | The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. The vulnerability is fixed in the following EOS versions: 4.26.3 and later releases in the 4.26.x train 4.25.6 and later releases in the 4.25.x train 4.24.8 and later releases in the 4.24.x train 4.23.10 and later releases in the 4.24.x train
Workaround
Disallowing user certificate authentication via eAPI can be used to mitigate the vulnerability. switch(config)#management security switch(config-mgmt-security)#ssl profile profileEAPI switch(config-mgmt-sec-ssl-profile-profileEAPI)#no trust certificate user.cert switch(config-mgmt-sec-ssl-profile-profileEAPI)#exit
No history.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-09-16T23:06:02.607Z
Reserved: 2021-03-16T00:00:00
Link: CVE-2021-28503
No data.
Status : Modified
Published: 2022-02-04T23:15:11.350
Modified: 2024-11-21T05:59:47.697
Link: CVE-2021-28503
No data.
OpenCVE Enrichment
No data.
EUVD