QID 43898

Date Published: 2022-01-25

QID 43898: Arista EOS OpenConfig Transport Protocols Vulnerability (SA0071)

Arista EOS is the Worlds Most Advanced Network Operating System.

Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry-standard CLI, and runs a single binary software image across the Arista switching family.

Several vulnerabilities related to OpenConfig transport protocols in Aristas EOS software

Affected EOS versions: 4.26.2F and below releases in the 4.26.x train
4.25.5.1M and below releases in the 4.25.5.x train
4.25.4M and below in the 4.25.4.x train
All prior releases in 4.25.x train
4.24.7M and below releases in the 4.24.x train
4.23.9M and below releases in the 4.23.x train
All releases in 4.22.x train
All releases in 4.21.x train
All prior releases
QID Detection Logic (Authenticated):
The check matches Arista EOS version retrieved via Unix Auth using "show version" command.

ertain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.
Under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent.

  • CVSS V3 rated as High - 7.1 severity.
  • CVSS V2 rated as Medium - 4.9 severity.
  • Solution
    Refer to Arista Security Advisory SA0071 for patch details.Workaround:

    Required Configuration for Exploitation. Configuration vulnerable to CVE-2021-28507 A service ACL is configured and ip access-list standard oc-acl 10 permit host 10.1.1.1 20 permit host 172.16.1.1/24 30 deny any gNMI/gNOI is configured with service ACL, or management api gnmi transport grpc default ip access-group oc-acl RESTCONF configured with service ACL. management api restconf transport https default ip access-group oc-acl

    CVEs related to QID 43898

    Software Advisories
    Advisory ID Software Component Link
    Security Advisory 0071 URL Logo www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071