{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-9134","assignerOrgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","state":"PUBLISHED","assignerShortName":"Arista","dateReserved":"2024-09-23T22:01:04.566Z","datePublished":"2025-01-10T21:44:17.415Z","dateUpdated":"2025-01-13T20:14:00.556Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Arista Edge Threat Management","vendor":"Arista Networks","versions":[{"lessThanOrEqual":"17.1.1","status":"affected","version":"17.1.0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>If the NGFW has one or more Report application Report Users with Online Access enabled they are vulnerable.</p><div>&nbsp;</div><div>To access this information:</div><ol><li>As the NGFW administrator, log into the UI and navigate to the Reports application.<p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-4.png\"></p></li></ol><p>The above picture shows the configuration panel for user access. The “<a target=\"_blank\" rel=\"nofollow\">reportuser@domain.com</a>” user has “Online Access” checked, which is required in order to be vulnerable.</p><h4>Indicators of Compromise</h4><p>Any compromise will reveal itself via the postgres user running a non-standard postgres process. &nbsp;</p><p>For example, an appropriate process list for running the postgres database will look like:</p><pre># ps -u postgres -f\nUID &nbsp; &nbsp; &nbsp; &nbsp; PID &nbsp; PPID  C STIME TTY  &nbsp; &nbsp; &nbsp; &nbsp; TIME CMD\npostgres  94057  &nbsp; &nbsp; 1  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:00 /usr/lib/postgresql/13/bin/postgres -D /var/lib/postgresql/13/main -c config_file=/etc/postgresql/13/main/postgresql.conf\npostgres  94063  94057  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:02 postgres: 13/main: checkpointer\npostgres  94064  94057  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:00 postgres: 13/main: background writer\npostgres  94065  94057  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:12 postgres: 13/main: walwriter\npostgres  94066  94057  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:00 postgres: 13/main: autovacuum launcher\npostgres  94067  94057  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:01 postgres: 13/main: stats collector\npostgres  94068  94057  0 Feb06 ?  &nbsp; &nbsp; &nbsp; 00:00:00 postgres: 13/main: logical replication launcher\n</pre><div>&nbsp;</div><p>Additional processes run by the postgres user indicating a potential compromise may look like:</p><pre>postgres 100172 100171  0 Feb06 pts/2  &nbsp; 00:00:00 bash</pre><br>"}],"value":"If the NGFW has one or more Report application Report Users with Online Access enabled they are vulnerable.\n\n \n\nTo access this information:\n\n  *  As the NGFW administrator, log into the UI and navigate to the Reports application.\n\n\nThe above picture shows the configuration panel for user access. The “reportuser@domain.com” user has “Online Access” checked, which is required in order to be vulnerable.\n\nIndicators of CompromiseAny compromise will reveal itself via the postgres user running a non-standard postgres process.  \n\nFor example, an appropriate process list for running the postgres database will look like:\n\n# ps -u postgres -f\nUID         PID   PPID  C STIME TTY          TIME CMD\npostgres  94057      1  0 Feb06 ?        00:00:00 /usr/lib/postgresql/13/bin/postgres -D /var/lib/postgresql/13/main -c config_file=/etc/postgresql/13/main/postgresql.conf\npostgres  94063  94057  0 Feb06 ?        00:00:02 postgres: 13/main: checkpointer\npostgres  94064  94057  0 Feb06 ?        00:00:00 postgres: 13/main: background writer\npostgres  94065  94057  0 Feb06 ?        00:00:12 postgres: 13/main: walwriter\npostgres  94066  94057  0 Feb06 ?        00:00:00 postgres: 13/main: autovacuum launcher\npostgres  94067  94057  0 Feb06 ?        00:00:01 postgres: 13/main: stats collector\npostgres  94068  94057  0 Feb06 ?        00:00:00 postgres: 13/main: logical replication launcher\n\n\n \n\nAdditional processes run by the postgres user indicating a potential compromise may look like:\n\npostgres 100172 100171  0 Feb06 pts/2    00:00:00 bash"}],"credits":[{"lang":"en","type":"finder","value":"Mehmet INCE from PRODAFT.com"}],"datePublic":"2024-10-29T20:20:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Multiple SQL Injection vulnerabilities exist in the reporting application.  A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges.</span><br>"}],"value":"Multiple SQL Injection vulnerabilities exist in the reporting application.  A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges."}],"impacts":[{"capecId":"CAPEC-66","descriptions":[{"lang":"en","value":"CAPEC-66 SQL Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","shortName":"Arista","dateUpdated":"2025-01-10T21:44:17.415Z"},"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.</div><ul><li>17.2 Upgrade</li></ul>"}],"value":"The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience.\n\n  *  17.2 Upgrade"}],"source":{"advisory":"105","defect":["NGFW-14721"],"discovery":"EXTERNAL"},"title":"Multiple SQL Injection vulnerabilities exist in the reporting application.  A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges.","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>For the Reports application, for all Reports Users, disable <i>Online Access.</i></p><p><img alt=\"Security Advisory 105\" src=\"https://www.arista.com/assets/images/article/SA105-5.png\"></p><div>To do this:</div><ol><li>As the NGFW administrator, log into the UI and go to the Reports application.</li><li>For all users with the <i>Online Access</i>&nbsp;checkbox (red box) enabled, uncheck it.</li><li>Click Save.</li></ol><br>"}],"value":"For the Reports application, for all Reports Users, disable Online Access.\n\n\n\nTo do this:\n\n  *  As the NGFW administrator, log into the UI and go to the Reports application.\n  *  For all users with the Online Access checkbox (red box) enabled, uncheck it.\n  *  Click Save."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-13T20:13:52.238229Z","id":"CVE-2024-9134","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-13T20:14:00.556Z"}}]}}