On Arista CloudVision Appliance (CVA) affected releases running on appliances that support hardware disk encryption (DCA-350E-CV only), the disk encryption might not be successfully performed. This results in the disks remaining unsecured and data on them
Advisories

No advisories yet.

Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see CloudVision Appliance 350E-CV - Arista https://www.arista.com/en/qsg-cva-350e-cv .   CVE-2024-7142 has been fixed in the following releases: * CVA 6.0.7 If the user runs the cva disk encryption enable command in the aforementioned releases containing the fix, the disks will be properly encrypted. In addition, the upgrade from a vulnerable CVA version to the versions mentioned above will fix the issue automatically. * If the key/password pair is found during the upgrade, the upgrade process will encrypt the disks properly. Just to be clear, if this upgrade process does not notice the corresponding key/password pair on the system, it will preserve the original intent of the user and will not encrypt the disks.  * If the user no longer wants to encrypt the disks even though they previously ran cva disk encryption enable command on a vulnerable release, cva disk encryption disable command must be run before the upgrade. This disable option will not be available on the new releases


Workaround

To manually fix the issue on a vulnerable system determined by following the steps depicted in the Determining a vulnerable device https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-2  section, run the following commands to enable the encryption of the virtual disks. The FQDD of the RAID controller(s) and virtual disks will be needed for this mitigation. See the Preliminary steps https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-3  section on how to retrieve them. Note as the security key was set before on this vulnerable system, it is not needed to set it again here. Please see the Caveats https://www.arista.com/en/support/advisories-notices/security-advisory/20405-security-advisory-0104#pageLink-4  section for more information. Generally, the overall process takes up to 10 minutes. The performance of a running system is not expected to degrade when the following steps are carried out. * Encrypt all virtual disks that belong to the RAID controller by running the following command for each of them: racadm storage encryptvd:<virtual drive FQDD>   * Create the job for the RAID controller and monitor its progress: racadm jobqueue create <RAID controller FQDD> --realtime   This command must return the scheduled configuration job ID in its output. Look for Commit JID = JID_xxxxx in the output. Then check the status of this job with racadm jobqueue view -i <jobId>. It will take up to 10 minutes to complete.  * After the job is complete, run the following command to see if all the virtual disks are encrypted. racadm storage get vdisks --refkey <RAID controller FQDD> -o The output should show Secured = YES against each one of them. The following is an example of the aforementioned steps. [root@cv ~]# racadm storage encryptvd:Disk.Virtual.238:RAID.SL.3-1 STOR094 : The storage configuration operation is successfully completed and the change is in pending state. <--snip—-> [root@cv ~]# racadm jobqueue create RAID.SL.3-1 --realtime RAC1024: Successfully scheduled a job. Verify the job status using "racadm jobqueue view -i JID_xxxxx" command. Commit JID = JID_218438865303 [root@cv ~]# racadm jobqueue view -i JID_218438865303 ---------------------------- JOB ------------------------- [Job ID=JID_218438865303] Job Name=Configure: RAID.SL.3-1 Status=Running <--snip—-> Percent Complete=[1] [root@cv ~]# racadm jobqueue view -i JID_218438865303 ---------------------------- JOB ------------------------- [Job ID=JID_218438865303] Job Name=Configure: RAID.SL.3-1 Status=Completed <--snip—-> Percent Complete=[100] [root@cv ~]# racadm storage get vdisks --refkey RAID.SL.3-1 -o Disk.Virtual.238:RAID.SL.3-1    Status                               = Ok    DeviceDescription                   = Virtual Disk 238 on RAID Controller in SL 3    Name                                 = os <--snip—->    Secured                             = YES <--snip—->     Disk.Virtual.239:RAID.SL.3-1    Status                               = Ok    DeviceDescription                   = Virtual Disk 239 on RAID Controller in SL 3    Name                                 = data <--snip—->    Secured                             = YES <--snip—->

History

Mon, 13 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Jan 2025 21:30:00 +0000

Type Values Removed Values Added
Description On Arista CloudVision Appliance (CVA) affected releases running on appliances that support hardware disk encryption (DCA-350E-CV only), the disk encryption might not be successfully performed. This results in the disks remaining unsecured and data on them
Title On Arista CloudVision Appliance (CVA) affected releases running on appliances that support hardware disk encryption (DCA-350E-CV only), the disk encryption might not be successfully performed. This results in the disks remaining unsecured and data on them
Weaknesses CWE-311
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-01-13T15:01:15.191Z

Reserved: 2024-07-26T18:43:29.610Z

Link: CVE-2024-7142

cve-icon Vulnrichment

Updated: 2025-01-13T15:01:07.956Z

cve-icon NVD

Status : Received

Published: 2025-01-10T22:15:26.403

Modified: 2025-01-10T22:15:26.403

Link: CVE-2024-7142

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.