In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentially enable authenticated users with read-only access to take actions that are otherwise restricted in the GUI.
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/9001-security-advisory-44 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-12-19 11:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-18181
Mitre link : CVE-2019-18181
JSON object : View
CWE
Products Affected
arista
- cloudvision_portal