
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-24509 is a privilege escalation vulnerability discovered in Arista EOS systems. The vulnerability affects modular platforms running Arista EOS equipped with redundant supervisor modules and having the redundancy protocol configured with RPR or SSO. The issue was discovered and reported by Marc-André Labonté, Senior Information Security Analyst at Desjardins, and was disclosed on February 14, 2023 (Arista Advisory).
The vulnerability has a CVSSv3.1 Base Score of 9.3 CRITICAL (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and is classified as CWE-269 (Improper Privilege Management). The vulnerability requires two conditions to be exploitable: two supervisor modules must both be inserted and active, and supervisor redundancy protocol must be configured with RPR (Route Processor Redundancy) or SSO (Stateful Switchover) on the switch (Arista Advisory).
When exploited, this vulnerability allows an existing unprivileged user to login to the standby supervisor as a root user, leading to a privilege escalation. The attack requires valid user credentials to be successful (NVD).
A temporary workaround involves disabling the 'ssh' CLI command in unprivileged mode on SSH client devices using command authorization through Role-Based Access Control (RBAC). For permanent resolution, Arista recommends upgrading to remediated versions: 4.28.4M or later, 4.27.7M or later, 4.26.9M or later, 4.25.10M or later, or 4.24.11M or later. A hotfix is also available for specific affected versions (Arista Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."