Arista Ng Firewall
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Arista Ng Firewall.
By the Year
In 2026 there have been 0 vulnerabilities in Arista Ng Firewall. Last year, in 2025 Ng Firewall had 1 security vulnerability published. Right now, Ng Firewall is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 9.60 |
| 2024 | 4 | 7.55 |
It may take a day or so for new Ng Firewall vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Arista Ng Firewall Security Vulnerabilities
Arista NG Firewall XSS RCE via User-Agent Header
CVE-2025-2767
9.6 - Critical
- April 23, 2025
Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the processing of the User-Agent HTTP header. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24407.
XSS
Arista NG Firewall SQL Injection Vulnerability in ReportEntry Class
CVE-2024-12832
6.3 - Medium
- December 20, 2024
Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325.
SQL Injection
Arista NG Firewall uvm_login Module Incorrect Authorization Privilege Escalation
CVE-2024-12831
7.8 - High
- December 20, 2024
Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the uvm_login module. The issue results from incorrect authorization. An attacker can leverage this to escalate privileges to resources normally protected from the user. Was ZDI-CAN-24324.
AuthZ
Arista NG Firewall custom_handler Directory Traversal RCE Vulnerability
CVE-2024-12830
7.3 - High
- December 20, 2024
Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the custom_handler method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-24019.
Directory traversal
Arista NG Firewall ExecManagerImpl Command Injection RCE
CVE-2024-12829
8.8 - High
- December 20, 2024
Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ExecManagerImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24015.
Shell injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Arista Ng Firewall or by Arista? Click the Watch button to subscribe.