{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-47517","assignerOrgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","state":"PUBLISHED","assignerShortName":"Arista","dateReserved":"2024-09-25T20:29:43.984Z","datePublished":"2025-01-10T21:47:30.950Z","dateUpdated":"2025-01-13T20:13:25.964Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Arista Edge Threat Management","vendor":"Arista Networks","versions":[{"lessThanOrEqual":"17.1.1","status":"affected","version":"17.1.0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<ol><li>Log into Edge Threat Management (ETM).</li><li>Go to Appliances, and click your target NGFW.</li><li>On the NGFW appliance page, click Remote Access.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-6.png\"></p></li><li>With the NGFW UI in a new tab or window, let the connection expire. &nbsp;</li><li>After the session has expired, any attempt to perform actions will notify you of the need to enable Remote Access again.</li></ol><br>"}],"value":"*  Log into Edge Threat Management (ETM).\n  *  Go to Appliances, and click your target NGFW.\n  *  On the NGFW appliance page, click Remote Access.\n\n\n  *  With the NGFW UI in a new tab or window, let the connection expire.  \n  *  After the session has expired, any attempt to perform actions will notify you of the need to enable Remote Access again."}],"credits":[{"lang":"en","type":"finder","value":"Mehmet INCE from PRODAFT.com"}],"datePublic":"2024-10-29T20:20:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access</span><br>"}],"value":"Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access"}],"impacts":[{"capecId":"CAPEC-639","descriptions":[{"lang":"en","value":"CAPEC-639"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1230","description":"CWE-1230","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","shortName":"Arista","dateUpdated":"2025-01-10T21:47:30.950Z"},"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"}],"value":"The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n  *  17.2 Upgrade"}],"source":{"advisory":"105","defect":["NGFW-14754"],"discovery":"EXTERNAL"},"title":"Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">After you have completed NGFW operations with Remote Access, close the browser window or tab.</span><br>"}],"value":"After you have completed NGFW operations with Remote Access, close the browser window or tab."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-13T20:13:17.296191Z","id":"CVE-2024-47517","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-13T20:13:25.964Z"}}]}}