CVE-2024-9188
Published: 10 January 2025
Summary
CVE-2024-9188 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Arista Ng Firewall. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates specially constructed queries to block the cross-site scripting payload before it triggers administrator token leakage.
Filters information outputs to prevent execution of injected scripts that leak administrator tokens in cross-platform scripting attacks.
Remediates the specific XSS flaw through timely patching as recommended in Arista's security advisory, directly addressing the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS vuln enables remote exploitation of public-facing web app (T1190) and direct theft of admin access tokens (T1528).
NVD Description
Specially constructed queries cause cross platform scripting leaking administrator tokens
Deeper analysisAI
CVE-2024-9188 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, where specially constructed queries trigger cross-platform scripting that leaks administrator tokens. It affects Arista Networks products, as indicated by the vendor's security advisory. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impact.
An unauthenticated remote attacker can exploit this vulnerability over the network with low complexity by tricking a user into processing a malicious query, which requires user interaction. Successful exploitation leaks administrator tokens, enabling high confidentiality, integrity, and availability impacts, potentially allowing attackers to escalate privileges or further compromise the affected system.
Arista's security advisory (https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105) provides details on the vulnerability, including recommended mitigations and patches for affected products. Security practitioners should consult this advisory for version-specific remediation steps.
Details
- CWE(s)