Skip to content

Commit efe7a0b

Browse files
Arista 2023
1 parent 608e882 commit efe7a0b

File tree

5 files changed

+5
-6
lines changed

5 files changed

+5
-6
lines changed

CVEasy/Arista/2023/cve202324513.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,8 @@ def rule_cve202324513(configuration, commands, device, devices):
5353
# Assert that the device is not vulnerable
5454
assert not is_vulnerable, (
5555
f"Device {device.name} is vulnerable to CVE-2023-24513. "
56-
"The device is running a vulnerable version on CloudEOS platform with Software Forwarding Engine (SFE) enabled, "
56+
"The device is running a vulnerable version on CloudEOS platform with "
57+
"Software Forwarding Engine (SFE) enabled, "
5758
"which could allow malformed packets to cause buffer leaks and stop traffic forwarding. "
5859
"Recommended fixes:\n"
5960
"- Upgrade to one of the following fixed versions:\n"

CVEasy/Arista/2023/cve202324545.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,8 @@ def rule_cve202324545(configuration, commands, device, devices):
5353
# Assert that the device is not vulnerable
5454
assert not is_vulnerable, (
5555
f"Device {device.name} is vulnerable to CVE-2023-24545. "
56-
"The device is running a vulnerable version on CloudEOS platform with Software Forwarding Engine (SFE) enabled, "
56+
"The device is running a vulnerable version on CloudEOS platform with "
57+
"Software Forwarding Engine (SFE) enabled, "
5758
"which could allow malformed packets to cause buffer leaks and stop traffic forwarding. "
5859
"Recommended fixes:\n"
5960
"- Upgrade to one of the following fixed versions:\n"

CVEasy/Arista/2023/cve202324547.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ def rule_cve202324547(configuration, commands, device, devices):
3838

3939
# Check BGP configuration for plaintext passwords
4040
bgp_config = commands.show_bgp_config
41-
41+
4242
# Look for BGP neighbor password configurations without type 7 encryption
4343
has_plaintext_password = False
4444
for line in bgp_config.splitlines():

CVEasy/Arista/2023/cve202324548.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,6 @@ def rule_cve202324548(configuration, commands, device, devices):
5151

5252
# Check if VXLAN VNIs are routable
5353
vxlan_vni = commands.show_vxlan_vni
54-
vlan_info = commands.show_vlan
5554
ip_interfaces = commands.show_ip_interface
5655

5756
# Look for routable VNIs (either VLAN interfaces or VRF-mapped)

CVEasy/Arista/2023/cve20233646.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77
commands=dict(
88
show_version='show version',
99
show_monitor='show monitor session',
10-
show_config='show running-config | section monitor'
1110
),
1211
)
1312
def rule_cve20233646(configuration, commands, device, devices):
@@ -36,7 +35,6 @@ def rule_cve20233646(configuration, commands, device, devices):
3635

3736
# Check for multiple destination ports in monitor sessions
3837
monitor_output = commands.show_monitor
39-
config_output = commands.show_config
4038

4139
# Check if any monitor session has multiple destinations configured
4240
multiple_destinations = False

0 commit comments

Comments
 (0)