This Advisory describes an issue that impacts Arista Wireless Access Points. Any entity with the ability to authenticate via SSH to an affected AP as the “config” user is able to cause a privilege escalation via spawning a bash shell. The SSH CLI session does not require high permissions to exploit this vulnerability, but the config password is required to establish the session. The spawned shell is able to obtain root privileges.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-44189 This Advisory describes an issue that impacts Arista Wireless Access Points. Any entity with the ability to authenticate via SSH to an affected AP as the “config” user is able to cause a privilege escalation via spawning a bash shell. The SSH CLI session does not require high permissions to exploit this vulnerability, but the config password is required to establish the session. The spawned shell is able to obtain root privileges.
Fixes

Solution

Arista recommends customers move to the latest version of each release that contains all the fixes listed below: CVE-2024-4578 has been fixed in the 13.x and 16.x release trains, as follows: * 13.0.2-28-vv1101 and later releases in the 13.0.2.x train * 16.1.0-51-vv703 and later releases in the 16.1.0.x train For more information about upgrading WiFi AP Software, please see Upgrade Server https://wifihelp.arista.com/post/upgrade-server  and Upgrading Firmware of Wi-Fi Access Points with On-Premises Wireless Manager https://wifihelp.arista.com/post/upgrading-firmware-of-wifi-access-points-with-on-premises-wireless-manager


Workaround

To mitigate the attack, configure a strong config shell password and share the password only with admin and/or trusted parties.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-08-01T20:47:41.270Z

Reserved: 2024-05-06T22:39:09.409Z

Link: CVE-2024-4578

cve-icon Vulnrichment

Updated: 2024-08-01T20:47:41.270Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-27T19:15:15.347

Modified: 2024-11-21T09:43:08.790

Link: CVE-2024-4578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses