HomeAristaCVE-2024-12830

CVE-2024-12830

HIGH
7.3CVSS
Published: 2024-12-20
Updated: 2025-01-03
AI Analysis

Description

Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the custom_handler method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-24019.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
low
Weaknesses
CWE-22

Metadata

Primary Vendor
ARISTA
Published
12/20/2024
Last Modified
1/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

arista : ng_firewall

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-12830 | HIGH Severity | CVEDatabase.com | CVEDatabase.com