Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12832: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Arista NG Firewall

0
High
VulnerabilityCVE-2024-12832cvecve-2024-12832cwe-89
Published: Fri Dec 20 2024 (12/20/2024, 00:05:34 UTC)
Source: CVE Database V5
Vendor/Project: Arista
Product: NG Firewall

Description

Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 02:45:29 UTC

Technical Analysis

CVE-2024-12832 is a SQL Injection vulnerability identified in the ReportEntry class of Arista NG Firewall version 17.1.1. The root cause is improper neutralization of special elements in user-supplied input used to construct SQL commands, classified under CWE-89. This flaw allows an authenticated remote attacker to inject malicious SQL code, enabling arbitrary file creation and disclosure of sensitive information stored within the firewall system. The vulnerability can be chained with other security weaknesses to escalate privileges and execute arbitrary code under the www-data user context, which is typically the web server user with limited but significant permissions. The attack vector is network-based, requiring authentication but no additional user interaction, making it relatively easy to exploit once credentials are obtained. The CVSS v3.0 base score is 8.3, reflecting high impact on confidentiality and integrity, with a low impact on availability. The vulnerability was reserved and published by the Zero Day Initiative (ZDI) in December 2024 and currently has no publicly known exploits. The lack of proper input validation in SQL query construction highlights a critical security oversight in the affected software version. No patches are listed yet, so mitigation relies on access controls and monitoring until updates are available.

Potential Impact

The vulnerability poses a significant risk to organizations deploying Arista NG Firewall 17.1.1, as it compromises the confidentiality and integrity of sensitive data managed by the firewall. Attackers with valid credentials can exploit the SQL Injection flaw to read sensitive files and create arbitrary files on the system, potentially leading to data leakage and persistence mechanisms for further attacks. The ability to execute arbitrary code as the www-data user can facilitate lateral movement within the network and undermine the firewall's security posture. Although availability impact is low, the breach of confidentiality and integrity can lead to regulatory compliance violations, reputational damage, and operational disruptions. Organizations relying on Arista NG Firewall for perimeter defense or internal segmentation may find their defenses bypassed or manipulated, increasing exposure to broader cyber threats.

Mitigation Recommendations

1. Immediately restrict access to the Arista NG Firewall management interface to trusted administrators only, using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and monitor for unusual login activities to prevent credential compromise. 3. Apply the official security patch from Arista as soon as it becomes available; monitor vendor advisories closely. 4. Implement input validation and sanitization at the application level if custom integrations exist. 5. Conduct regular audits of firewall logs and system files to detect signs of exploitation or unauthorized file creation. 6. Use Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) capable of detecting SQL Injection attempts targeting the firewall management interface. 7. Limit the privileges of the www-data user and isolate critical components to reduce the impact of potential code execution. 8. Educate administrators on the risks of SQL Injection and the importance of credential security to reduce risk of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-12-19T22:20:12.893Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e49b7ef31ef0b59c59b

Added to database: 2/25/2026, 9:48:57 PM

Last enriched: 2/26/2026, 2:45:29 AM

Last updated: 4/12/2026, 1:07:40 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses