Vulnerability Description
In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentially enable authenticated users with read-only access to take actions that are otherwise restricted in the GUI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arista | Cloudvision Portal | >= 2018.1.0, <= 2018.1.4 |
References
- https://www.arista.com/en/support/advisories-notices/security-advisories/9001-seVendor Advisory
- https://www.arista.com/en/support/advisories-notices/security-advisories/9001-seVendor Advisory
FAQ
What is CVE-2019-18181?
CVE-2019-18181 is a vulnerability with a CVSS score of 7.8 (HIGH). In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configle...
How severe is CVE-2019-18181?
CVE-2019-18181 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18181?
Check the references section above for vendor advisories and patch information. Affected products include: Arista Cloudvision Portal.