Description
On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
- Attack Vector
- network
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- none
- Weaknesses
- CWE-284CWE-863
Metadata
- Primary Vendor
- ARISTA
- Published
- 6/13/2023
- Last Modified
- 1/6/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
arista : cloudvision_portalarista : cloudvision_portalarista : cloudvision_portalarista : cloudvision_portalarista : cloudvision_portalarista : cloudvision_portal
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.