This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak MACsec sensitive data in clear text in CVP to other authorized users, which could cause MACsec traffic to be decrypted or modified by other authorized users on the device.

Project Subscriptions

Vendors Products
7050cx3-32s Subscribe
7050cx3m-32s Subscribe
7050sx3-48c8 Subscribe
7050sx3-48yc Subscribe
7050sx3-48yc12 Subscribe
7050sx3-48yc8 Subscribe
7050sx3-96yc8 Subscribe
7050tx3-48c8 Subscribe
7280cr2ak-30 Subscribe
7280cr2k-60 Subscribe
7280cr3-32d4 Subscribe
7280cr3-32p4 Subscribe
7280cr3-96 Subscribe
7280cr3k-32d4 Subscribe
7280cr3k-32p4 Subscribe
7280cr3k-96 Subscribe
7280dr3-24 Subscribe
7280dr3k-24 Subscribe
7280pr3-24 Subscribe
7280pr3k-24 Subscribe
7280sr3-48yc8 Subscribe
7280sr3k-48yc8 Subscribe
7500r3-24d Subscribe
7500r3-24p Subscribe
7500r3-36cq Subscribe
7500r3k-36cq Subscribe
7800r3-36p Subscribe
7800r3-48cq Subscribe
7800r3k-48cq Subscribe
Ccs-722xpm-48y4 Subscribe
Ccs-722xpm-48zy8 Subscribe
Dcs-7050cx3-32s Subscribe
Dcs-7050cx3-32s-r Subscribe
Dcs-7050cx3m-32s Subscribe
Dcs-7050sx3-48c8 Subscribe
Dcs-7050sx3-48yc12 Subscribe
Dcs-7050sx3-48yc8 Subscribe
Dcs-7050sx3-96yc8 Subscribe
Terminattr Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-15185 This advisory documents the impact of an internally found vulnerability in Arista EOS state streaming telemetry agent TerminAttr and OpenConfig transport protocols. The impact of this vulnerability is that, in certain conditions, TerminAttr might leak MACsec sensitive data in clear text in CVP to other authorized users, which could cause MACsec traffic to be decrypted or modified by other authorized users on the device.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. The vulnerability is fixed in the following versions: EOS versions: 4.24.10 and later release in the 4.24.x train 4.25.8 and later releases in the 4.25.x train 4.26.6 and later releases in the 4.26.x train 4.27.4 and later releases in the 4.27.x train TerminAttr versions: TerminAttr v1.10.11 and later releases in the v1.10.x train TerminAttr v1.16.8 and later releases in the v1.16.x train TerminAttr v1.19.2 and later releases


Workaround

On the affected versions, the vulnerabilities can be mitigated by disabling TerminAttr agent.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-16T20:32:30.399Z

Reserved: 2021-03-16T00:00:00

Link: CVE-2021-28509

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-26T20:15:08.500

Modified: 2024-11-21T05:59:48.463

Link: CVE-2021-28509

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses