Description
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
Published: 2023-04-25
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

While the steps listed above resolve the issue, the recommended long term solution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. There are two possible solutions: Upgrade the Streaming Telemetry Agent Customers can upgrade the Streaming Telemetry Agent to a fixed version, following the directions in https://arista.my.site.com/AristaCommunity/s/article/terminattr-upgrade-downgrade. Fixes are available in the following supported release trains: TerminAttr 1.25.0 and later Terminattr versions Users of 1.24.X and 1.23.X TerminAttr releases should upgrade to TerminAttr 1.25.0 or later. TerminAttr 1.22.2 and later version in the TerminAttr 1.22.X train TerminAttr 1.19.6 and later versions in the TerminAttr 1.19.X train


Vendor Workaround

The streaming telemetry agent can be configured in gRPC read-only mode by specifying -grpcreadonly as part of its configuration. For instance as follows: switch# daemon TerminAttr exec /usr/bin/TerminAttr -grpcreadonly -grpcaddr=... <other options...> no shutdown If TerminAttr is running, it must be restarted for the configuration to take effect. This can be done as follows: switch# daemon TerminAttr shutdown wait-for-warmup no shutdown

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-28530 On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
History

Mon, 03 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Arista 32qd 48ehs 48lbas 48lbs 48s6qd 7010t-48 7020sr-24c2 7020sr-32c2 7020tr-48 7020tra-48 7050cx3-32s 7050cx3m-32s 7050qx-32s 7050qx2-32s 7050sx-128 7050sx-64 7050sx-72q 7050sx2-128 7050sx2-72q 7050sx3-48c8 7050sx3-48yc 7050sx3-48yc12 7050sx3-48yc8 7050sx3-96yc8 7050tx-48 7050tx-64 7050tx-72q 7050tx2-128 7050tx3-48c8 7060cx-32s 7060cx2-32s 7060dx4-32 7060px4-32 7060sx2-48yc6 7130-16g3s 7130-48g3s 7130-96s 7150s-24 7150s-52 7150s-64 7150sc-24 7150sc-64 7160-32cq 7160-48tc6 7160-48yc6 7170-32c 7170-32cd 7170-64c 7170b-64c 720df-48y 720dp-24s 720dp-48s 720dt-24s 720dt-48s 720xp-24y6 720xp-24zy4 720xp-48y6 720xp-48zc2 720xp-96zc2 7250qx-64 7260cx 7260cx3 7260qx 7260sx2 7280cr2k-60 7280cr3-32d4 7280cr3-32p4 7280cr3-96 7280cr3k-32d4 7280cr3k-32p4 7280cr3k-96 7280dr3-24 7280dr3k-24 7280e 7280pr3-24 7280pr3k-24 7280sr3-48yc8 7280sr3k-48yc8 7300x-32q 7300x-64s 7300x-64t 7300x3-32c 7300x3-48yc4 7320x-32c 7358x4 7368x4 7388x5 7500r3-24d 7500r3-24p 7500r3-36cq 7500r3k-36cq 7804r3 7808r3 7812r3 7816r3 96lbs Ceos-lab Cloudeos Dcs-7010tx-48 Dcs-7500-12cq-lc Dcs-7500e-12cm-lc Dcs-7500e-36q-lc Dcs-7500e-48s-lc Dcs-7500e-6c2-lc Dcs-7500e-72s-lc Dcs-7500r-36cq-lc Dcs-7500r-36q-lc Dcs-7500r-48s2cq-lc Eos Veos-lab
cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-02-03T19:15:59.467Z

Reserved: 2023-01-24T00:00:00.000Z

Link: CVE-2023-24512

cve-icon Vulnrichment

Updated: 2024-08-02T10:56:04.371Z

cve-icon NVD

Status : Modified

Published: 2023-04-25T21:15:10.190

Modified: 2024-11-21T07:48:01.437

Link: CVE-2023-24512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses