Protection mechanism failure in Arista MultiAccess FPGA software



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-6068
CWE-ID CWE-693
Exploitation vector Network
Public exploit N/A
Vulnerable software
MultiAccess FPGA software
Server applications / Other server solutions

Vendor Arista Networks

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Protection Mechanism Failure

EUVDB-ID: #VU109392

Risk: Low

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6068

CWE-ID: CWE-693 - Protection Mechanism Failure

Exploit availability: No

Description

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures when applying ACLs. Some ACL rules can be incorrectly applied to a port resulting in some packets that should be denied being permitted and some packets that should be permitted being denied.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

MultiAccess FPGA software: before 1.8.0

CPE2.3 External links

https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###