Show plain JSON{"id": "CVE-2021-28498", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}, {"type": "Secondary", "source": "psirt@arista.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.7, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 6.0, "exploitabilityScore": 2.0}]}, "published": "2021-09-09T13:15:09.433", "references": [{"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12912-security-advisory-64", "tags": ["Mitigation", "Vendor Advisory"], "source": "psirt@arista.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-522"}]}, {"type": "Secondary", "source": "psirt@arista.com", "description": [{"lang": "en", "value": "CWE-255"}]}], "descriptions": [{"lang": "en", "value": "In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train"}, {"lang": "es", "value": "En el software MOS (Metamako Operating System) de Arista, compatible con la l\u00ednea de productos 7130, las contrase\u00f1as de habilitaci\u00f3n de usuarios ajustadas en texto sin cifrar podr\u00edan resultar en que usuarios no privilegiados obtuvieran acceso completo a los sistemas. Este problema afecta a: Sistema Operativo Arista Metamako MOS-0.13 y versiones posteriores en MOS-0.1x train MOS-0.26.6 y versiones anteriores en MOS-0.2x train MOS-0.31.1 y versiones anteriores en MOS-0.3x train"}], "lastModified": "2023-06-30T21:29:50.630", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:arista:metamako_operating_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B89974C-FC70-4BA1-B700-2F0E1A448939", "versionEndIncluding": "0.13.0", "versionStartIncluding": "0.10.0"}, {"criteria": "cpe:2.3:o:arista:metamako_operating_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27248149-FE2F-4775-9DA8-4841C25B1864", "versionEndExcluding": "0.26.7", "versionStartIncluding": "0.26.0"}, {"criteria": "cpe:2.3:o:arista:metamako_operating_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C66AFCAE-47B5-47D5-96AF-C0986611A4C0", "versionEndExcluding": "0.32.0", "versionStartIncluding": "0.31.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4D832798-DA45-4F9E-AA31-5D088253A28A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@arista.com"}