Project Subscriptions
| Vendors | Products |
|---|---|
|
Arista
Subscribe
|
7050cx3-32s
Subscribe
7050cx3m-32s
Subscribe
7050sx3-48c8
Subscribe
7050sx3-48yc
Subscribe
7050sx3-48yc12
Subscribe
7050sx3-48yc8
Subscribe
7050sx3-96yc8
Subscribe
7050tx3-48c8
Subscribe
7280cr2ak-30
Subscribe
7280cr2k-60
Subscribe
7280cr3-32d4
Subscribe
7280cr3-32p4
Subscribe
7280cr3-96
Subscribe
7280cr3k-32d4
Subscribe
7280cr3k-32p4
Subscribe
7280cr3k-96
Subscribe
7280dr3-24
Subscribe
7280dr3k-24
Subscribe
7280pr3-24
Subscribe
7280pr3k-24
Subscribe
7280r2
Subscribe
7280r3
Subscribe
7280sr3-48yc8
Subscribe
7280sr3k-48yc8
Subscribe
7388x5
Subscribe
7500r2
Subscribe
7500r3
Subscribe
7500r3-24d
Subscribe
7500r3-24p
Subscribe
7500r3-36cq
Subscribe
7500r3k-36cq
Subscribe
7800r3-36p
Subscribe
7800r3-48cq
Subscribe
7800r3k-48cq
Subscribe
Ccs-722xpm-48y4
Subscribe
Ccs-722xpm-48zy8
Subscribe
Dcs-7050cx3-32s
Subscribe
Dcs-7050cx3-32s-r
Subscribe
Dcs-7050cx3m-32s
Subscribe
Dcs-7050sx3-48c8
Subscribe
Dcs-7050sx3-48yc12
Subscribe
Dcs-7050sx3-48yc8
Subscribe
Dcs-7050sx3-96yc8
Subscribe
Eos
Subscribe
Terminattr
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15185 | This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak MACsec sensitive data in clear text in CVP to other authorized users, which could cause MACsec traffic to be decrypted or modified by other authorized users on the device. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. The vulnerability is fixed in the following versions: EOS versions: 4.24.10 and later release in the 4.24.x train 4.25.8 and later releases in the 4.25.x train 4.26.6 and later releases in the 4.26.x train 4.27.4 and later releases in the 4.27.x train TerminAttr versions: TerminAttr v1.10.11 and later releases in the v1.10.x train TerminAttr v1.16.8 and later releases in the v1.16.x train TerminAttr v1.19.2 and later releases
Workaround
On the affected versions, the vulnerabilities can be mitigated by disabling TerminAttr agent.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-09-16T20:32:30.399Z
Reserved: 2021-03-16T00:00:00
Link: CVE-2021-28509
No data.
Status : Modified
Published: 2022-05-26T20:15:08.500
Modified: 2024-11-21T05:59:48.463
Link: CVE-2021-28509
No data.
OpenCVE Enrichment
No data.
EUVD