Backup uploads to ETM subject to man-in-the-middle interception
Weakness
The product performs a key exchange with an actor without verifying the identity of that actor.
Affected Software
| Name |
Vendor |
Start Version |
End Version |
| Ng_firewall |
Arista |
* |
17.1.1 (including) |
Potential Mitigations
References