Description
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
Published: 2023-04-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see Eos User Manual: Upgrades and Downgrades CVE-2023-24511 has been fixed in the following releases: 4.29.2F and later releases in the 4.29.x train 4.28.6M and later releases in the 4.28.x train 4.27.9M and later releases in the 4.27.x train 4.26.10M and later releases in the 4.26.x train


Vendor Workaround

If you suspect you are encountering this issue due to malicious activity, the workaround is to enable SNMP service ACLs to only allow specific IP addresses to query SNMP (combined with anti-spoofing ACLs in the rest of the network). snmp-server ipv4 access-list allowHosts4 snmp-server ipv6 access-list allowHosts6 ! ipv6 access-list allowHosts6 10 permit ipv6 host <ipv6 address> any ! ip access-list allowHosts4 10 permit ip host <ipv4 address> any

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-28529 On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Arista 7010t 7010t-48 7010tx-48 7010tx-48-dc 7020sr-24c2 7020sr-32c2 7020tr-48 7020tra-48 7050cx3-32s 7050cx3m-32s 7050qx-32s 7050qx2-32s 7050sx-128 7050sx-64 7050sx-72q 7050sx2-128 7050sx2-72q 7050sx3-48c8 7050sx3-48yc 7050sx3-48yc12 7050sx3-48yc8 7050sx3-96yc8 7050tx-48 7050tx-64 7050tx-72q 7050tx2-128 7050tx3-48c8 7060cx-32s 7060cx2-32s 7060dx4-32 7060px4-32 7060sx2-48yc6 7150s-24 7150s-52 7150s-64 7150sc-24 7150sc-64 7160-32cq 7160-48tc6 7160-48yc6 7170-32c 7170-32cd 7170-64c 7170b-64c 720df-48y 720dp-24s 720dp-48s 720dt-24s 720dt-48s 720dt-48y 720xp-24y6 720xp-24zy4 720xp-48y6 720xp-48zc2 720xp-96zc2 722xpm-48y4 722xpm-48zy8 7250qx-64 7260cx 7260cx3 7260cx3-64 7260qx 7260qx-64 7280cr2ak-30 7280cr2k-60 7280cr3-32d4 7280cr3-32p4 7280cr3-96 7280cr3k-32d4 7280cr3k-32p4 7280cr3k-96 7280dr3-24 7280dr3k-24 7280e 7280pr3-24 7280pr3k-24 7280r 7280r2 7280r3 7280sr3-48yc8 7280sr3k-48yc8 7300x-32q 7300x-64s 7300x-64t 7300x3-32c 7300x3-48yc4 7304 7308 7316 7320x-32c 7368x4 7388x5 7500e 7500r 7500r2 7500r3 7500r3-24d 7500r3-24p 7500r3-36cq 7500r3k-36cq 7800r3-36p 7800r3-48cq 7800r3k-48cq Ccs-750x-48thp Ccs-750x-48tp Ccs-750x-48zp Ccs-750x-48zxp Ceos-lab Cloudeos Eos Veos-lab
cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-02-07T15:47:42.435Z

Reserved: 2023-01-24T00:00:00.000Z

Link: CVE-2023-24511

cve-icon Vulnrichment

Updated: 2024-08-02T10:56:04.366Z

cve-icon NVD

Status : Modified

Published: 2023-04-12T21:15:16.707

Modified: 2024-11-21T07:48:01.287

Link: CVE-2023-24511

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses