Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00087.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Arista
Subscribe
|
32qd
Subscribe
48ehs
Subscribe
48lbas
Subscribe
48lbs
Subscribe
48s6qd
Subscribe
7010t-48
Subscribe
7020sr-24c2
Subscribe
7020sr-32c2
Subscribe
7020tr-48
Subscribe
7020tra-48
Subscribe
7050cx3-32s
Subscribe
7050cx3m-32s
Subscribe
7050qx-32s
Subscribe
7050qx2-32s
Subscribe
7050sx-128
Subscribe
7050sx-64
Subscribe
7050sx-72q
Subscribe
7050sx2-128
Subscribe
7050sx2-72q
Subscribe
7050sx3-48c8
Subscribe
7050sx3-48yc
Subscribe
7050sx3-48yc12
Subscribe
7050sx3-48yc8
Subscribe
7050sx3-96yc8
Subscribe
7050tx-48
Subscribe
7050tx-64
Subscribe
7050tx-72q
Subscribe
7050tx2-128
Subscribe
7050tx3-48c8
Subscribe
7060cx-32s
Subscribe
7060cx2-32s
Subscribe
7060dx4-32
Subscribe
7060px4-32
Subscribe
7060sx2-48yc6
Subscribe
7130-16g3s
Subscribe
7130-48g3s
Subscribe
7130-96s
Subscribe
7150s-24
Subscribe
7150s-52
Subscribe
7150s-64
Subscribe
7150sc-24
Subscribe
7150sc-64
Subscribe
7160-32cq
Subscribe
7160-48tc6
Subscribe
7160-48yc6
Subscribe
7170-32c
Subscribe
7170-32cd
Subscribe
7170-64c
Subscribe
7170b-64c
Subscribe
720df-48y
Subscribe
720dp-24s
Subscribe
720dp-48s
Subscribe
720dt-24s
Subscribe
720dt-48s
Subscribe
720xp-24y6
Subscribe
720xp-24zy4
Subscribe
720xp-48y6
Subscribe
720xp-48zc2
Subscribe
720xp-96zc2
Subscribe
7250qx-64
Subscribe
7260cx
Subscribe
7260cx3
Subscribe
7260qx
Subscribe
7260sx2
Subscribe
7280cr2k-60
Subscribe
7280cr3-32d4
Subscribe
7280cr3-32p4
Subscribe
7280cr3-96
Subscribe
7280cr3k-32d4
Subscribe
7280cr3k-32p4
Subscribe
7280cr3k-96
Subscribe
7280dr3-24
Subscribe
7280dr3k-24
Subscribe
7280e
Subscribe
7280pr3-24
Subscribe
7280pr3k-24
Subscribe
7280sr3-48yc8
Subscribe
7280sr3k-48yc8
Subscribe
7300x-32q
Subscribe
7300x-64s
Subscribe
7300x-64t
Subscribe
7300x3-32c
Subscribe
7300x3-48yc4
Subscribe
7320x-32c
Subscribe
7358x4
Subscribe
7368x4
Subscribe
7388x5
Subscribe
7500r3-24d
Subscribe
7500r3-24p
Subscribe
7500r3-36cq
Subscribe
7500r3k-36cq
Subscribe
7804r3
Subscribe
7808r3
Subscribe
7812r3
Subscribe
7816r3
Subscribe
96lbs
Subscribe
Ceos-lab
Subscribe
Cloudeos
Subscribe
Dcs-7010tx-48
Subscribe
Dcs-7500-12cq-lc
Subscribe
Dcs-7500e-12cm-lc
Subscribe
Dcs-7500e-36q-lc
Subscribe
Dcs-7500e-48s-lc
Subscribe
Dcs-7500e-6c2-lc
Subscribe
Dcs-7500e-72s-lc
Subscribe
Dcs-7500r-36cq-lc
Subscribe
Dcs-7500r-36q-lc
Subscribe
Dcs-7500r-48s2cq-lc
Subscribe
Eos
Subscribe
Veos-lab
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28530 | On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision |
Solution
While the steps listed above resolve the issue, the recommended long term solution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. There are two possible solutions: Upgrade the Streaming Telemetry Agent Customers can upgrade the Streaming Telemetry Agent to a fixed version, following the directions in https://arista.my.site.com/AristaCommunity/s/article/terminattr-upgrade-downgrade. Fixes are available in the following supported release trains: TerminAttr 1.25.0 and later Terminattr versions Users of 1.24.X and 1.23.X TerminAttr releases should upgrade to TerminAttr 1.25.0 or later. TerminAttr 1.22.2 and later version in the TerminAttr 1.22.X train TerminAttr 1.19.6 and later versions in the TerminAttr 1.19.X train
Workaround
The streaming telemetry agent can be configured in gRPC read-only mode by specifying -grpcreadonly as part of its configuration. For instance as follows: switch# daemon TerminAttr exec /usr/bin/TerminAttr -grpcreadonly -grpcaddr=... <other options...> no shutdown If TerminAttr is running, it must be restarted for the configuration to take effect. This can be done as follows: switch# daemon TerminAttr shutdown wait-for-warmup no shutdown
Mon, 03 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-02-03T19:15:59.467Z
Reserved: 2023-01-24T00:00:00.000Z
Link: CVE-2023-24512
Updated: 2024-08-02T10:56:04.371Z
Status : Modified
Published: 2023-04-25T21:15:10.190
Modified: 2024-11-21T07:48:01.437
Link: CVE-2023-24512
No data.
OpenCVE Enrichment
No data.
EUVD