📦 Eos
by Arista
🔍 What is Eos?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows an existing unprivileged user with valid credentials to log into the standby supervisor module as root, leading to privilege escalation on affected Arista EOS platforms. It a...
This vulnerability in Arista EOS allows local users with 'nopassword' configuration to gain unrestricted access to network devices due to incorrect AAA API usage by OpenConfig and TerminAttr agents. I...
CVE-2021-28506 is an authentication bypass vulnerability in Arista EOS gNOI APIs that allows unauthorized factory resets of network devices. This affects Arista EOS users with gNOI APIs enabled. Attac...
This vulnerability in Arista EOS DHCP relay agent allows an attacker to cause a denial of service by sending a malformed DHCP packet, leading to the agent restarting. It affects Arista switches and ro...
This vulnerability allows authenticated attackers with gNMI access to modify arbitrary configurations on Arista EOS switches when the Streaming Telemetry Agent (TerminAttr) is enabled with gNMI config...
This vulnerability in Arista EOS platforms allows VXLAN match rules in IPv4 access-lists to ignore specified IP protocols when applied to L2/L3 port ingress. This can lead to unintended traffic being ...
Arista EOS eAPI authentication bypass vulnerability allows remote attackers to access network devices without proper credential validation when certificate-based authentication is enabled. This affect...