PRODAFT hat dies direkt geteilt
🚨 Patch your Arista Networks products right now!🚨 Proud to announce that back in May 2024, we reported 9 zero-day vulnerabilities to Arista Networks, a leader in data-driven, client-to-cloud networking for large data canters, campuses, and routing environments. Security and network management solutions are natural targets for attackers looking to infiltrate companies through supply-chain vulnerabilities. At PRODAFT, our mission is to proactively identify vulnerabilities that could be exploited on a large scale—before adversaries have the chance. I was also pleased to share these findings directly with key stakeholders at our TLP:Red event in the U.K. on June 7th. CVE-2024-9131 - Authenticated Remote Code Execution via Command Injection CVE-2024-9132 - Unauthenticated Remote Code Execution via Apache Python CustomHandler Endpoint CVE-2024-9133 - Privilege Escalation by Authentication Bypass via Abusing Local Access to JSON-RPC Endoint CVE-2024-9134 - Low-privileged User Multiple SQL Injection Bypass Leads to Remote Code Execution CVE-2024-47517 - Leaking Authentication Tokens of all the Arista Devices across the world via SSH Forwarding due to Static Private Key CVE-2024-47518/CVE-2024-47519 - Leaking Backup Files via MITM due to insecure usage of curl CVE-2024-47520/CVE-2024-47521 - Jabsorb Java Unmarshalling Vulnerability A huge thank you to Arista Networks for their collaboration and commitment to security. Together, we’re making strides in strengthening the resilience of today’s networked environments. Further details: https://lnkd.in/eqR2R2bN