Description
This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak MACsec sensitive data in clear text in CVP to other authorized users, which could cause MACsec traffic to be decrypted or modified by other authorized users on the device.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
- Attack Vector
- network
- Complexity
- low
- Privileges
- high
- User Action
- required
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- none
- Weaknesses
- CWE-255CWE-319
Metadata
- Primary Vendor
- ARISTA
- Published
- 5/26/2022
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
arista : terminattrarista : terminattrarista : terminattrarista : eosarista : eosarista : eosarista : eosarista : eosarista : terminattrarista : terminattrarista : terminattrarista : eosarista : eosarista : eosarista : eosarista : eosarista : terminattrarista : terminattrarista : terminattrarista : eosarista : eosarista : eosarista : eosarista : eosarista : terminattrarista : terminattrarista : terminattrarista : eosarista : eosarista : eosarista : eosarista : eosarista : terminattrarista : terminattrarista : terminattrarista : eosarista : eosarista : eosarista : eosarista : eosarista : terminattrarista : terminattrarista : terminattrarista : eosarista : eosarista : eosarista : eosarista : eos
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.