The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-15179 The impact of this vulnerability is that Arista's EOS eAPI may skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. The vulnerability is fixed in the following EOS versions: 4.26.3 and later releases in the 4.26.x train 4.25.6 and later releases in the 4.25.x train 4.24.8 and later releases in the 4.24.x train 4.23.10 and later releases in the 4.24.x train


Workaround

Disallowing user certificate authentication via eAPI can be used to mitigate the vulnerability. switch(config)#management security switch(config-mgmt-security)#ssl profile profileEAPI switch(config-mgmt-sec-ssl-profile-profileEAPI)#no trust certificate user.cert switch(config-mgmt-sec-ssl-profile-profileEAPI)#exit

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-16T23:06:02.607Z

Reserved: 2021-03-16T00:00:00

Link: CVE-2021-28503

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-04T23:15:11.350

Modified: 2024-11-21T05:59:47.697

Link: CVE-2021-28503

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.