Metrics
Affected Vendors & Products
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see CVP Software downloads https://www.arista.com/en/support/software-download CVE-2024-8100 has been fixed in the following releases: * 2024.1.3 and later releases in the 2024.1.x train * 2024.2.2 and later releases in the 2024.2.x train * 2024.3.1 and later releases in the 2024.3.x train * 2025.1.0 and later releases in the 2025.1.x train
Workaround
Best practice is for generated device onboarding tokens to be valid for a limited time duration, and for the Device Onboarding permission which allows the generation of these tokens to only be granted to trusted users. Successful exploit generally requires one of the following: * A rogue or compromised internal user with Device enrollment read/write permissions OR, * A valid device onboarding token that is easily accessible beyond the expected set of trusted users If all users with Device Onboarding privileges are trusted, and onboarding tokens are properly secured, then the risk of this issue is limited.
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 08 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 08 May 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On affected versions of the Arista CloudVision Portal (CVP on-prem), the time-bound device onboarding token can be used to gain admin privileges on CloudVision. | |
Title | On affected versions of the Arista CloudVision Portal (CVP on-prem), the time-bound device onboarding token can be used to gain admin privileges on CloudVision. | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-05-08T18:57:09.478Z
Reserved: 2024-08-22T18:18:50.804Z
Link: CVE-2024-8100

Updated: 2025-05-08T18:57:02.574Z

Status : Awaiting Analysis
Published: 2025-05-08T19:16:01.183
Modified: 2025-05-12T17:32:52.810
Link: CVE-2024-8100

No data.

No data.