First published: Thu May 08 2025(Updated: )
On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-premise. It does not impact CloudVision as-a-Service.
Credit: psirt@arista.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arista CloudVision |
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see CloudVision Users Guide https://www.arista.io/help/2024.3/articles/dXBncmFkZS5BbGwudXBncmFkZQ== . CVE-2024-11186 has been fixed in the following releases: * 2025.1.0 and later releases in the 2025.1.x train * 2024.3.1 and later releases in the 2024.3.x train * 2024.2.2 and later releases in the 2024.2.x train * 2024.1.3 and later releases in the 2024.1.x train
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11186 has been rated as a critical severity vulnerability due to improper access controls allowing escalation of privileges.
To fix CVE-2024-11186, ensure that you apply the latest security patch provided by Arista for the CloudVision Portal.
CVE-2024-11186 affects on-premise installations of the Arista CloudVision Portal.
CVE-2024-11186 can be exploited by a malicious authenticated user to gain unauthorized access to managed EOS devices.
The risks associated with CVE-2024-11186 include unauthorized actions on managed EOS devices, potentially leading to network compromise.