Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
The recommended resolution for all issues documented above is to upgrade to the version indicated below at your earliest convenience. * 17.2 Upgrade
Vendor Workaround
After you have completed your Remote Access session, close the NGFW window.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-42721 | Specially constructed queries targeting ETM could discover active remote access sessions |
Mon, 29 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arista
Arista ng Firewall |
|
| CPEs | cpe:2.3:a:arista:ng_firewall:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arista
Arista ng Firewall |
Mon, 13 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Jan 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Specially constructed queries targeting ETM could discover active remote access sessions | |
| Title | Specially constructed queries targeting ETM could discover active remote access sessions | |
| Weaknesses | CWE-552 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-01-13T20:12:59.435Z
Reserved: 2024-09-25T20:29:43.984Z
Link: CVE-2024-47518
Updated: 2025-01-13T20:12:54.576Z
Status : Analyzed
Published: 2025-01-10T22:15:26.053
Modified: 2025-09-29T12:30:54.990
Link: CVE-2024-47518
No data.
OpenCVE Enrichment
No data.
EUVD