CVE-2023-24546
13.06.2023, 21:15
On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.Enginsight
Vendor | Product | Version |
---|---|---|
arista | cloudvision_portal | 2021.1 ≤ 𝑥 ≤ 2021.3 |
arista | cloudvision_portal | 2022.1.0 |
arista | cloudvision_portal | 2022.1.1 |
arista | cloudvision_portal | 2022.2.0 |
arista | cloudvision_portal | 2022.2.1 |
arista | cloudvision_portal | 2022.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.