Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-28563 | On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the MOS User Guide: Updating https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf CVE-2023-24547 has been fixed in the following releases: * MOS-0.36.10 and later releases in the MOS-0.36.x train * MOS-0.39.4 and later releases in the MOS-0.39.x train Because this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below: switch>show running-config bgp router bgp 65000 neighbor 192.0.2.1 remote-as 66000 neighbor 192.0.2.1 password key 7 00143242404C5B140B
Workaround
No mitigation exists.
Wed, 28 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-05-28T15:54:35.342Z
Reserved: 2023-01-26T11:37:43.827Z
Link: CVE-2023-24547

Updated: 2024-08-02T11:03:18.908Z

Status : Modified
Published: 2023-12-06T00:15:07.030
Modified: 2024-11-21T07:48:05.987
Link: CVE-2023-24547

No data.

No data.