CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

arista

cloudvision_portal

8 known vulnerabilities · sorted by CVSS score

CVE-2023-24546
HIGH8.1

On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.

arista / cloudvision_portal+5
Network
Published Jun 13, 2023
CVE-2019-18181
HIGH7.8

In CloudVision Portal all releases in the 2018.1 and 2018.2 Code train allows users with read-only permissions to bypass permissions for restricted functionality via CVP API calls through the Configlet Builder modules. This vulnerability can potentially enable authenticated users with read-only access to take actions that are otherwise restricted in the GUI.

arista / cloudvision_portal+1
Local
Published Dec 19, 2019
CVE-2020-13881
HIGH7.5

In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.

pam_tacplus_project / pam_tacplus+6
Network
Published Jun 6, 2020
CVE-2019-17596
HIGH7.5

Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.

golang / go+17
Network
Published Oct 24, 2019
CVE-2018-12357
MEDIUM6.5

Arista CloudVision Portal through 2018.1.1 has Incorrect Permissions.

arista / cloudvision_portal
Network
Published Aug 15, 2019
CVE-2020-24333
MEDIUM6.5

A vulnerability in Arista’s CloudVision Portal (CVP) prior to 2020.2 allows users with “read-only” or greater access rights to the Configlet Management module to download files not intended for access, located on the CVP server, by accessing a specific API.

arista / cloudvision_portal
Network
Published Sep 22, 2020
CVE-2019-18615
MEDIUM4.9

In CloudVision Portal (CVP) for all releases in the 2018.2 Train, under certain conditions, the application logs user passwords in plain text for certain API calls, potentially leading to user password exposure. This only affects CVP environments where: 1. Devices have enable mode passwords which are different from the user's login password, OR 2. There are configlet builders that use the Device class and specify username and password explicitly Application logs are not accessible or visible from the CVP GUI. Application logs can only be read by authorized users with privileged access to the VM hosting the CVP application.

arista / cloudvision_portal
Network
Published Dec 19, 2019
CVE-2022-29071
MEDIUM4.0

This advisory documents an internally found vulnerability in the on premises deployment model of Arista CloudVision Portal (CVP) where under a certain set of conditions, user passwords can be leaked in the Audit and System logs. The impact of this vulnerability is that the CVP user login passwords might be leaked to other authenticated users.

arista / cloudvision_portal
Local
Published Aug 5, 2022