On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-premise. It does not impact CloudVision as-a-Service.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-54463 On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-premise. It does not impact CloudVision as-a-Service.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see CloudVision Users Guide https://www.arista.io/help/2024.3/articles/dXBncmFkZS5BbGwudXBncmFkZQ== .   CVE-2024-11186 has been fixed in the following releases: * 2025.1.0 and later releases in the 2025.1.x train * 2024.3.1 and later releases in the 2024.3.x train * 2024.2.2 and later releases in the 2024.2.x train * 2024.1.3 and later releases in the 2024.1.x train


Workaround

The workaround is to append the following to /etc/nginx/conf.d/locations/cvp.https.conf on all CVP nodes: location ^~ /cvpservice/di/ { return 404; }   Then restart nginx by running the following command on any node: nginx-app.sh reload

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00059}

epss

{'score': 0.00062}


Thu, 08 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 May 2025 19:00:00 +0000

Type Values Removed Values Added
Description On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-premise. It does not impact CloudVision as-a-Service.
Title On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-prem
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-05-08T19:01:23.429Z

Reserved: 2024-11-13T17:09:34.018Z

Link: CVE-2024-11186

cve-icon Vulnrichment

Updated: 2025-05-08T19:01:14.387Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-08T19:15:57.100

Modified: 2025-05-12T17:32:52.810

Link: CVE-2024-11186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses