On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.

Project Subscriptions

Vendors Products
7010t-48 Subscribe
7010tx-48 Subscribe
7010tx-48-dc Subscribe
7020sr-24c2 Subscribe
7020sr-32c2 Subscribe
7020tr-48 Subscribe
7020tra-48 Subscribe
7050cx3-32s Subscribe
7050cx3m-32s Subscribe
7050qx-32s Subscribe
7050qx2-32s Subscribe
7050sx-128 Subscribe
7050sx-64 Subscribe
7050sx-72q Subscribe
7050sx2-128 Subscribe
7050sx2-72q Subscribe
7050sx3-48c8 Subscribe
7050sx3-48yc Subscribe
7050sx3-48yc12 Subscribe
7050sx3-48yc8 Subscribe
7050sx3-96yc8 Subscribe
7050tx-48 Subscribe
7050tx-64 Subscribe
7050tx-72q Subscribe
7050tx2-128 Subscribe
7050tx3-48c8 Subscribe
7060cx-32s Subscribe
7060cx2-32s Subscribe
7060dx4-32 Subscribe
7060px4-32 Subscribe
7060sx2-48yc6 Subscribe
7150s-24 Subscribe
7150s-52 Subscribe
7150s-64 Subscribe
7150sc-24 Subscribe
7150sc-64 Subscribe
7160-32cq Subscribe
7160-48tc6 Subscribe
7160-48yc6 Subscribe
7170-32c Subscribe
7170-32cd Subscribe
7170-64c Subscribe
7170b-64c Subscribe
720df-48y Subscribe
720dp-24s Subscribe
720dp-48s Subscribe
720dt-24s Subscribe
720dt-48s Subscribe
720dt-48y Subscribe
720xp-24y6 Subscribe
720xp-24zy4 Subscribe
720xp-48y6 Subscribe
720xp-48zc2 Subscribe
720xp-96zc2 Subscribe
722xpm-48y4 Subscribe
722xpm-48zy8 Subscribe
7250qx-64 Subscribe
7260cx3 Subscribe
7260cx3-64 Subscribe
7260qx-64 Subscribe
7280cr2ak-30 Subscribe
7280cr2k-60 Subscribe
7280cr3-32d4 Subscribe
7280cr3-32p4 Subscribe
7280cr3-96 Subscribe
7280cr3k-32d4 Subscribe
7280cr3k-32p4 Subscribe
7280cr3k-96 Subscribe
7280dr3-24 Subscribe
7280dr3k-24 Subscribe
7280pr3-24 Subscribe
7280pr3k-24 Subscribe
7280sr3-48yc8 Subscribe
7280sr3k-48yc8 Subscribe
7300x-32q Subscribe
7300x-64s Subscribe
7300x-64t Subscribe
7300x3-32c Subscribe
7300x3-48yc4 Subscribe
7320x-32c Subscribe
7500r3-24d Subscribe
7500r3-24p Subscribe
7500r3-36cq Subscribe
7500r3k-36cq Subscribe
7800r3-36p Subscribe
7800r3-48cq Subscribe
7800r3k-48cq Subscribe
Ccs-750x-48thp Subscribe
Ccs-750x-48tp Subscribe
Ccs-750x-48zp Subscribe
Ccs-750x-48zxp Subscribe
Ceos-lab Subscribe
Cloudeos Subscribe
Veos-lab Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-28529 On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see Eos User Manual: Upgrades and Downgrades CVE-2023-24511 has been fixed in the following releases: 4.29.2F and later releases in the 4.29.x train 4.28.6M and later releases in the 4.28.x train 4.27.9M and later releases in the 4.27.x train 4.26.10M and later releases in the 4.26.x train


Workaround

If you suspect you are encountering this issue due to malicious activity, the workaround is to enable SNMP service ACLs to only allow specific IP addresses to query SNMP (combined with anti-spoofing ACLs in the rest of the network). snmp-server ipv4 access-list allowHosts4 snmp-server ipv6 access-list allowHosts6 ! ipv6 access-list allowHosts6 10 permit ipv6 host <ipv6 address> any ! ip access-list allowHosts4 10 permit ip host <ipv4 address> any

History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-02-07T15:47:42.435Z

Reserved: 2023-01-24T00:00:00.000Z

Link: CVE-2023-24511

cve-icon Vulnrichment

Updated: 2024-08-02T10:56:04.366Z

cve-icon NVD

Status : Modified

Published: 2023-04-12T21:15:16.707

Modified: 2024-11-21T07:48:01.287

Link: CVE-2023-24511

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses