vulnerability
security-advisory-0096
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:N/C:N/I:C/A:N) | May 21, 2024 | Sep 4, 2024 | Jan 14, 2026 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:N/I:C/A:N)
Published
May 21, 2024
Added
Sep 4, 2024
Modified
Jan 14, 2026
Description
On affected platforms running Arista EOS with 802.1x authentication configured on the access/trunk ports, and routing enabled on the access VLAN of the ports, a malicious supplicant may be able to bypass the requirement to perform 802.1x authentication. This issue was discovered internally and Arista is not aware of any malicious uses of this issue in customer networks.
Solution
upgrade-solution-cve-2023-5502
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.