First published: Thu Apr 13 2023(Updated: )
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
Credit: psirt@arista.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arista EOS | >=4.23<=4.23.13m | |
Arista EOS | >=4.24.0<4.24.11m | |
Arista EOS | >=4.25.0<4.25.10m | |
Arista EOS | >=4.26.0<4.26.9m | |
Arista EOS | >=4.27.0<4.27.7m | |
Arista EOS | >=4.28.0<4.28.4m | |
Arista 704x3 | ||
Arista 7304x3 | ||
Arista 7304x3 | ||
Arista 7308 | ||
Arista 7316x | ||
Arista 7324x | ||
Arista 7328x | ||
Arista 7504R3 | ||
Arista 7504R3 | ||
Arista 7508R3 | ||
Arista 7508R3 | ||
Arista 7512R3 | ||
Arista 7512R3 | ||
Arista 7516R | ||
Arista 7550 Series | ||
Arista 758x | ||
Arista 7804r3 | ||
Arista 7808R3 | ||
Arista 7812R3 | ||
Arista 7816R3 |
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2023-24509 has been fixed in the following releases: 4.28.4M and later releases in the 4.28.x train 4.27.7M and later releases in the 4.27.x train 4.26.9M and later releases in the 4.26.x train 4.25.10M and later releases in the 4.25.x train 4.24.11M and later releases in the 4.24.x train
The following hotfix can be applied to remediate CVE-2023-24509. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above).: 4.28.3M and below releases in the 4.28.x train 4.27.6M and below releases in the 4.27.x train 4.26.8M and below releases in the 4.26.x train 4.25.9M and below releases in the 4.25.x train 4.24.10M 4.23.13M Note: Installing/uninstalling the SWIX will cause ConfigAgent to restart and disconnect existing CLI sessions. Version: 1.0 URL: SecurityAdvisory82_CVE-2023-24509_Hotfix.swix SWIX hash: (SHA-512)7833ab99e11cfea1ec28c09aedffd062cfc865a20a843ee6184caff1081e748c8a02590644d0c7b0e377027379cbaadc8b1a70d1c37097bf98c1bedb429dca56
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24509 is critical, with a CVSS score of 7.8.
CVE-2023-24509 allows an unprivileged user to escalate privileges and login as a root user on affected Arista EOS platforms with redundant supervisor modules and RPR or SSO configured.
Arista EOS versions 4.23 to 4.28.4m are affected by CVE-2023-24509.
To mitigate CVE-2023-24509, upgrade to a fixed version of Arista EOS, such as 4.29 or later.
More information about CVE-2023-24509 can be found in the Arista Security Advisory 0082 at https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082.