{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T09:44:01.450","vulnerabilities":[{"cve":{"id":"CVE-2022-29071","sourceIdentifier":"psirt@arista.com","published":"2022-08-05T17:15:08.500","lastModified":"2024-11-21T06:58:26.187","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"This advisory documents an internally found vulnerability in the on premises deployment model of Arista CloudVision Portal (CVP) where under a certain set of conditions, user passwords can be leaked in the Audit and System logs. The impact of this vulnerability is that the CVP user login passwords might be leaked to other authenticated users."},{"lang":"es","value":"Este aviso documenta una vulnerabilidad encontrada internamente en el modelo de despliegue on premises de Arista CloudVision Portal (CVP) en el que, bajo un determinado conjunto de condiciones, las contraseñas de los usuarios pueden filtrarse en los registros de auditoría y del sistema. El impacto de esta vulnerabilidad es que las contraseñas de inicio de sesión de los usuarios de CVP podrían filtrarse a otros usuarios autenticados"}],"metrics":{"cvssMetricV31":[{"source":"psirt@arista.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":4.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.5,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@arista.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*","versionStartIncluding":"2020.2.0","versionEndIncluding":"2022.1.0","matchCriteriaId":"ED4D7A3F-C668-4F58-929E-4EEFF6E15C94"}]}]}],"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/15865-security-advisory-0079","source":"psirt@arista.com","tags":["Vendor Advisory"]},{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/15865-security-advisory-0079","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}