Backup uploads to ETM subject to man-in-the-middle interception
Weakness
The product performs a key exchange with an actor without verifying the identity of that actor.
Affected Software
| Name | Vendor | Start Version | End Version |
|---|
| Ng_firewall | Arista | * | 17.1.1 (including) |
Potential Mitigations
References