On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-28527 On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2023-24509 has been fixed in the following releases: 4.28.4M and later releases in the 4.28.x train 4.27.7M and later releases in the 4.27.x train 4.26.9M and later releases in the 4.26.x train 4.25.10M and later releases in the 4.25.x train 4.24.11M and later releases in the 4.24.x train


Workaround

The workaround is to disable “ssh” CLI command in unprivileged mode on the SSH client devices by using command authorization. This can be done with Role-Based Access Control (RBAC). If the “ssh” CLI command is currently used to connect to a remote host, the destination address can be added to an allowlist with RBAC.

History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-02-07T15:42:09.265Z

Reserved: 2023-01-24T00:00:00.000Z

Link: CVE-2023-24509

cve-icon Vulnrichment

Updated: 2024-08-02T10:56:04.282Z

cve-icon NVD

Status : Modified

Published: 2023-04-13T20:15:08.843

Modified: 2024-11-21T07:48:00.993

Link: CVE-2023-24509

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.