Логотип exploitDog
bind:CVE-2023-24509
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-24509

Количество 2

Количество 2

nvd логотип

CVE-2023-24509

почти 3 года назад

On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.

CVSS3: 9.3
EPSS: Низкий
github логотип

GHSA-w53j-gpf9-387j

почти 3 года назад

On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-24509

On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.

CVSS3: 9.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-w53j-gpf9-387j

On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.

CVSS3: 7.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу