First published: Fri Dec 20 2024(Updated: )
Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ExecManagerImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24015.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arista Edge Threat Management - Arista NG Firewall | ||
Arista Edge Threat Management - Arista NG Firewall | =17.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12829 is considered critical due to its potential for remote code execution.
To fix CVE-2024-12829, update Arista NG Firewall to the latest version provided by the vendor.
CVE-2024-12829 allows remote attackers to perform command injection leading to arbitrary code execution.
Yes, authentication is required to exploit CVE-2024-12829.
CVE-2024-12829 affects Arista NG Firewall version 17.1.1.