Show plain JSON{"containers": {"cna": {"affected": [{"product": "EOS", "vendor": "Arista Networks", "versions": [{"lessThanOrEqual": "4.26.0", "status": "affected", "version": "4.26.2F", "versionType": "custom"}, {"lessThanOrEqual": "4.25.5", "status": "affected", "version": "4.25.5.1M", "versionType": "custom"}, {"lessThanOrEqual": "4.25.4", "status": "affected", "version": "4.25.4M", "versionType": "custom"}, {"lessThanOrEqual": "4.25.0", "status": "affected", "version": "4.25.3", "versionType": "custom"}, {"lessThanOrEqual": "4.24.2F", "status": "affected", "version": "4.24.7M", "versionType": "custom"}]}], "datePublic": "2022-01-11T00:00:00", "descriptions": [{"lang": "en", "value": "An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-01-14T19:04:50", "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071"}], "solutions": [{"lang": "en", "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release. \nCVE-2021-28506 has been fixed in the following releases:\n4.26.3M and later releases in the 4.26.x train\n4.25.6M and later releases in the 4.25.x train\n4.25.4.1M and later releases in the 4.25.4.x train\n4.24.8M and later releases in the 4.24.x train"}], "source": {"advisory": "71", "defect": ["BUG", "606192"], "discovery": "EXTERNAL"}, "title": "An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.", "workarounds": [{"lang": "en", "value": "No mitigation options available"}, {"lang": "en", "value": "To mitigate CVE-2021-28506 with the continued use of the affected agents, a hotfix employing a proxy service can be deployed. The proxy is configured behind the gNMI/gNOI or RESTCONF server. The hotfix can be downloaded at https://www.arista.com/en/support/advisories-notices/sa-download/?sa=71-SecurityAdvisory0071Hotfix.i386.swix for 32 bit systems and https://www.arista.com/en/support/advisories-notices/sa-download/?sa=71-SecurityAdvisory0071Hotfix.x86_64.swix for 64 bit systems."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "psirt@arista.com", "DATE_PUBLIC": "2022-01-11T22:22:00.000Z", "ID": "CVE-2021-28506", "STATE": "PUBLIC", "TITLE": "An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device."}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "EOS", "version": {"version_data": [{"version_affected": "<=", "version_name": "4.26.2F", "version_value": "4.26.0"}, {"version_affected": "<=", "version_name": "4.25.5.1M", "version_value": "4.25.5"}, {"version_affected": "<=", "version_name": "4.25.4M", "version_value": "4.25.4"}, {"version_affected": "<=", "version_name": "4.25.3", "version_value": "4.25.0"}, {"version_affected": "<=", "version_name": "4.24.7M", "version_value": "4.24.2F"}]}}]}, "vendor_name": "Arista Networks"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "An issue has recently been discovered in Arista EOS where certain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-285 Improper Authorization"}]}]}, "references": {"reference_data": [{"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071"}]}, "solution": [{"lang": "en", "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release. \nCVE-2021-28506 has been fixed in the following releases:\n4.26.3M and later releases in the 4.26.x train\n4.25.6M and later releases in the 4.25.x train\n4.25.4.1M and later releases in the 4.25.4.x train\n4.24.8M and later releases in the 4.24.x train"}], "source": {"advisory": "71", "defect": ["BUG", "606192"], "discovery": "EXTERNAL"}, "work_around": [{"lang": "en", "value": "No mitigation options available"}, {"lang": "en", "value": "To mitigate CVE-2021-28506 with the continued use of the affected agents, a hotfix employing a proxy service can be deployed. The proxy is configured behind the gNMI/gNOI or RESTCONF server. The hotfix can be downloaded at https://www.arista.com/en/support/advisories-notices/sa-download/?sa=71-SecurityAdvisory0071Hotfix.i386.swix for 32 bit systems and https://www.arista.com/en/support/advisories-notices/sa-download/?sa=71-SecurityAdvisory0071Hotfix.x86_64.swix for 64 bit systems."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T21:47:32.674Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071"}]}]}, "cveMetadata": {"assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "assignerShortName": "Arista", "cveId": "CVE-2021-28506", "datePublished": "2022-01-14T19:04:50.282050Z", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-09-16T22:09:48.017Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}