{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-47518","assignerOrgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","state":"PUBLISHED","assignerShortName":"Arista","dateReserved":"2024-09-25T20:29:43.984Z","datePublished":"2025-01-10T21:52:19.808Z","dateUpdated":"2025-01-13T20:12:59.435Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Arista Edge Threat Management","vendor":"Arista Networks","versions":[{"lessThanOrEqual":"17.1.1","status":"affected","version":"17.1.0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<ol><li>Log into Edge Threat Management (ETM).</li><li>Go to Appliances, and click your target NGFW.</li><li>On the NGFW appliance page, click Remote Access.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-6.png\"></p></li><li>Leave the connection running.</li></ol><br>"}],"value":"*  Log into Edge Threat Management (ETM).\n  *  Go to Appliances, and click your target NGFW.\n  *  On the NGFW appliance page, click Remote Access.\n\n\n  *  Leave the connection running."}],"datePublic":"2024-10-29T20:20:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Specially constructed queries targeting ETM could discover active remote access sessions</span><br>"}],"value":"Specially constructed queries targeting ETM could discover active remote access sessions"}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.4,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-552","description":"CWE-552","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","shortName":"Arista","dateUpdated":"2025-01-10T21:52:19.808Z"},"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"}],"value":"The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n  *  17.2 Upgrade"}],"source":{"advisory":"105","defect":["NGFW-14626"],"discovery":"EXTERNAL"},"title":"Specially constructed queries targeting ETM could discover active remote access sessions","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">After you have completed your Remote Access session, close the NGFW window.</span><br>"}],"value":"After you have completed your Remote Access session, close the NGFW window."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-13T20:12:47.805872Z","id":"CVE-2024-47518","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-13T20:12:59.435Z"}}]}}