{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-9132","assignerOrgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","state":"PUBLISHED","assignerShortName":"Arista","dateReserved":"2024-09-23T22:01:00.888Z","datePublished":"2025-01-10T21:35:14.483Z","dateUpdated":"2025-01-13T17:49:01.649Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Arista Edge Threat Management","vendor":"Arista Networks","versions":[{"lessThanOrEqual":"17.1.1","status":"affected","version":"17.1.0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<ol><li>As the NGFW administrator, log into the user interface and navigate to the Apps and Services page.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-1.png\"></p></li><li>If you do not see the Captive Portal application, it is not installed and the system is not </li><li>vulnerable.</li><li>Click the Captive Portal application</li><li>If you see the status that <b>Captive Portal is disabled</b>, the system is not vulnerable.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-2.png\"></p></li><li>Click the Captive Page tab.</li><li>If the Custom radio button is not selected, the system is not vulnerable.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-3.png\"></p></li></ol><p>An example of a vulnerable page (The “Custom” radio button is selected)</p><br><br>"}],"value":"*  As the NGFW administrator, log into the user interface and navigate to the Apps and Services page.\n\n\n  *  If you do not see the Captive Portal application, it is not installed and the system is not \n  *  vulnerable.\n  *  Click the Captive Portal application\n  *  If you see the status that Captive Portal is disabled, the system is not vulnerable.\n\n\n  *  Click the Captive Page tab.\n  *  If the Custom radio button is not selected, the system is not vulnerable.\n\n\nAn example of a vulnerable page (The “Custom” radio button is selected)"}],"credits":[{"lang":"en","type":"finder","value":"Mehmet INCE from PRODAFT.com"}],"datePublic":"2024-10-29T20:20:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">The administrator is able to configure an insecure captive portal script</span><br>"}],"value":"The administrator is able to configure an insecure captive portal script"}],"impacts":[{"capecId":"CAPEC-229","descriptions":[{"lang":"en","value":"CAPEC-229"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","shortName":"Arista","dateUpdated":"2025-01-10T21:35:14.483Z"},"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"}],"value":"The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n  *  17.2 Upgrade"}],"source":{"advisory":"105","defect":["NGFW-14744"],"discovery":"EXTERNAL"},"title":"The administrator is able to configure an insecure captive portal script","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>Disable custom page.</div><ol><li>As the NGFW administrator, log into the UI and navigate to the Captive Portal application.</li><li>Select either “<i>Basic Message</i>” or “<i>Basic Login”</i></li><li>Click Save.</li></ol><br>"}],"value":"Disable custom page.\n\n  *  As the NGFW administrator, log into the UI and navigate to the Captive Portal application.\n  *  Select either “Basic Message” or “Basic Login”\n  *  Click Save."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-13T17:48:50.056627Z","id":"CVE-2024-9132","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-13T17:49:01.649Z"}}]}}