CVE-2021-28509

Published May 26, 2022

Last updated 2 years ago

Overview

Description
This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak MACsec sensitive data in clear text in CVP to other authorized users, which could cause MACsec traffic to be decrypted or modified by other authorized users on the device.
Source
psirt@arista.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
6.1
Impact score
5.2
Exploitability score
0.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
3.6
Impact score
4.9
Exploitability score
3.9
Vector string
AV:N/AC:H/Au:S/C:P/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-319
psirt@arista.com
CWE-255

Social media

Hype score
Not currently trending

Configurations