Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-28529 | On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see Eos User Manual: Upgrades and Downgrades CVE-2023-24511 has been fixed in the following releases: 4.29.2F and later releases in the 4.29.x train 4.28.6M and later releases in the 4.28.x train 4.27.9M and later releases in the 4.27.x train 4.26.10M and later releases in the 4.26.x train
Workaround
If you suspect you are encountering this issue due to malicious activity, the workaround is to enable SNMP service ACLs to only allow specific IP addresses to query SNMP (combined with anti-spoofing ACLs in the rest of the network). snmp-server ipv4 access-list allowHosts4 snmp-server ipv6 access-list allowHosts6 ! ipv6 access-list allowHosts6 10 permit ipv6 host <ipv6 address> any ! ip access-list allowHosts4 10 permit ip host <ipv4 address> any
Fri, 07 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-02-07T15:47:42.435Z
Reserved: 2023-01-24T00:00:00.000Z
Link: CVE-2023-24511

Updated: 2024-08-02T10:56:04.366Z

Status : Modified
Published: 2023-04-12T21:15:16.707
Modified: 2024-11-21T07:48:01.287
Link: CVE-2023-24511

No data.

No data.