RSS   Vulnerabilities for 'Cloudvision portal'   RSS

2020-09-22
 
CVE-2020-24333

CWE-287
 

 

 
2019-12-19
 
CVE-2019-18181

CWE-269
 

 
In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentially enable authenticated users with read-only access to take actions that are otherwise restricted in the GUI.

 
 
CVE-2019-18615

CWE-522
 

 
In CloudVision Portal (CVP) for all releases in the 2018.2 Train, under certain conditions, the application logs user passwords in plain text for certain API calls, potentially leading to user password exposure. This only affects CVP environments where: 1. Devices have enable mode passwords which are different from the user's login password, OR 2. There are configlet builders that use the Device class and specify username and password explicitly Application logs are not accessible or visible from the CVP GUI. Application logs can only be read by authorized users with privileged access to the VM hosting the CVP application.

 
2019-08-15
 
CVE-2018-12357

CWE-275
 

 
Arista CloudVision Portal through 2018.1.1 has Incorrect Permissions.

 
2017-01-23
 
CVE-2016-9012

 

 
CloudVision Portal (CVP) before 2016.1.2.1 allows remote authenticated users to gain access to the internal configuration mechanisms via the management plane, related to a request to /web/system/console/bundle.

 

 >>> Vendor: Arista 6 Products
EOS
Dcs-7050t eos software
Dcs-7050q eos software
Dcs-7050s eos software
Cloudvision portal
Cloudvision exchange


Copyright 2021, cxsecurity.com

 

Back to Top