Security Advisory 0051
Date: September 9th, 2020
|1.0||September 9th, 2020||Initial Release|
The CVE-ID tracking this issue is: CVE-2020-24333
CVSSv3.1 Base Score: 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
This advisory documents the impact of a vulnerability in Arista’s CloudVision Portal (CVP). The effect of this vulnerability is that users with “read-only” or greater access rights to the Configlet Management module can download files not intended for access, located on the CVP server, by accessing a specific API. This API can only be accessed by authenticated users.
The access rights of a given user are based on the user’s assigned role. “network-operators” have “read-only” access rights to all modules (including Configlet Management) and any user with a network-operator role is therefore affected. The “network-admins” role is affected as well due to its access rights to all modules. If a custom role has been configured, the associated access rights can be viewed by opening the /cv/settings/aaa-roles URL on the CVP Web GUI.
The following steps detail how the access rights for a user “test_user” with role “Test Role” can be viewed from the CVP Web GUI:
1) Check the assigned role(s) for a given user from /cv/settings/aaa-users:
2) View the access rights of the concerned role from /cv/settings/aaa-roles:
This vulnerability was discovered internally and there has been no report of exploitation in the field.
|All releases prior to 2020.2|
- This vulnerability affects CloudVision virtual and physical appliances running with the versions identified above.
- The following products are not affected:
- CloudVision as-a-Service
- EOS running on Arista switching platforms
- CloudEOS VM / vEOS Router
- Arista Wireless Access Points
- Arista 7130 Systems running MOS
- Big Switch Nodes for BCF and BMF (Arista CCF and DMF)
For custom roles, access to the Configlet Management Module can be disabled by navigating to Settings/Access Controls/Roles/Role_name on the CVP Web GUI and selecting “No Access” as indicated below:
Please note that module access cannot be disabled for default roles “network-operator” and “network-admin”. The above mitigation step applies to custom roles alone. For the resolution, please refer to the next section which lists the details of the remediated software versions.
This vulnerability is being tracked by Bug 502053 and has been addressed in the 2020.1.2, 2020.2.0 and later versions of CloudVision Portal. The recommended resolution is to upgrade to a version of CloudVision Portal with the fix included.
For More Information:
If you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:
Open a Service Request:
By email: firstname.lastname@example.org
By telephone: 408-547-5502