An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration.
Solution:
Workaround:
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 | patch exploit vendor advisory mitigation |