Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28527 | On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2023-24509 has been fixed in the following releases: 4.28.4M and later releases in the 4.28.x train 4.27.7M and later releases in the 4.27.x train 4.26.9M and later releases in the 4.26.x train 4.25.10M and later releases in the 4.25.x train 4.24.11M and later releases in the 4.24.x train
Workaround
The workaround is to disable “ssh” CLI command in unprivileged mode on the SSH client devices by using command authorization. This can be done with Role-Based Access Control (RBAC). If the “ssh” CLI command is currently used to connect to a remote host, the destination address can be added to an allowlist with RBAC.
Fri, 07 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-02-07T15:42:09.265Z
Reserved: 2023-01-24T00:00:00.000Z
Link: CVE-2023-24509
Updated: 2024-08-02T10:56:04.282Z
Status : Modified
Published: 2023-04-13T20:15:08.843
Modified: 2024-11-21T07:48:00.993
Link: CVE-2023-24509
No data.
OpenCVE Enrichment
No data.
EUVD