Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44189 | This Advisory describes an issue that impacts Arista Wireless Access Points. Any entity with the ability to authenticate via SSH to an affected AP as the “config” user is able to cause a privilege escalation via spawning a bash shell. The SSH CLI session does not require high permissions to exploit this vulnerability, but the config password is required to establish the session. The spawned shell is able to obtain root privileges. |
Solution
Arista recommends customers move to the latest version of each release that contains all the fixes listed below: CVE-2024-4578 has been fixed in the 13.x and 16.x release trains, as follows: * 13.0.2-28-vv1101 and later releases in the 13.0.2.x train * 16.1.0-51-vv703 and later releases in the 16.1.0.x train For more information about upgrading WiFi AP Software, please see Upgrade Server https://wifihelp.arista.com/post/upgrade-server and Upgrading Firmware of Wi-Fi Access Points with On-Premises Wireless Manager https://wifihelp.arista.com/post/upgrading-firmware-of-wifi-access-points-with-on-premises-wireless-manager
Workaround
To mitigate the attack, configure a strong config shell password and share the password only with admin and/or trusted parties.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-08-01T20:47:41.270Z
Reserved: 2024-05-06T22:39:09.409Z
Link: CVE-2024-4578
Updated: 2024-08-01T20:47:41.270Z
Status : Awaiting Analysis
Published: 2024-06-27T19:15:15.347
Modified: 2024-11-21T09:43:08.790
Link: CVE-2024-4578
No data.
OpenCVE Enrichment
No data.
EUVD