CVE-2024-47520
Published: 10 January 2025
Summary
CVE-2024-47520 is a high-severity Improper Isolation or Compartmentalization (CWE-653) vulnerability in Arista Ng Firewall. Its CVSS base score is 7.6 (High).
Operationally, ranked at the 30.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-24 (Access Control Decisions).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access, directly preventing users from performing unauthorized actions despite having advanced report access rights.
Applies least privilege to limit users to only necessary permissions, reducing the scope of unauthorized actions exploitable via the authorization flaw.
Ensures access control decisions are properly defined and reviewed, addressing flawed authorization logic that allows unintended actions for report users.
NVD Description
A user with advanced report application access rights can perform actions for which they are not authorized
Deeper analysisAI
CVE-2024-47520 is an authorization vulnerability (CWE-653) affecting Arista software, where a user with advanced report application access rights can perform actions for which they are not authorized. It has a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L), indicating high severity due to significant impacts on confidentiality and integrity.
The vulnerability can be exploited by a low-privileged, authenticated attacker over the network with low complexity, though it requires user interaction. Successful exploitation allows the attacker to achieve high confidentiality and integrity impacts, with low availability impact, enabling unauthorized actions beyond the user's intended permissions within the affected report application.
Arista's security advisory (https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105) provides details on patches and mitigations; security practitioners should consult it for specific remediation steps, such as applying updates to vulnerable components.
Details
- CWE(s)