QID 43898
Date Published: 2022-01-25
QID 43898: Arista EOS OpenConfig Transport Protocols Vulnerability (SA0071)
Arista EOS is the Worlds Most Advanced Network Operating System.
Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry-standard CLI, and runs a single binary software image across the Arista switching family.
Several vulnerabilities related to OpenConfig transport protocols in Aristas EOS software
Affected EOS versions:
4.26.2F and below releases in the 4.26.x train
4.25.5.1M and below releases in the 4.25.5.x train
4.25.4M and below in the 4.25.4.x train
All prior releases in 4.25.x train
4.24.7M and below releases in the 4.24.x train
4.23.9M and below releases in the 4.23.x train
All releases in 4.22.x train
All releases in 4.21.x train
All prior releases
QID Detection Logic (Authenticated):
The check matches Arista EOS version retrieved via Unix Auth using "show version" command.
ertain gNOI APIs incorrectly skip authorization and authentication which could potentially allow a factory reset of the device.
Under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent.
Required Configuration for Exploitation. Configuration vulnerable to CVE-2021-28507 A service ACL is configured and ip access-list standard oc-acl 10 permit host 10.1.1.1 20 permit host 172.16.1.1/24 30 deny any gNMI/gNOI is configured with service ACL, or management api gnmi transport grpc default ip access-group oc-acl RESTCONF configured with service ACL. management api restconf transport https default ip access-group oc-acl
- Arista:Security Advisory 0071 -
www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071
CVEs related to QID 43898
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Security Advisory 0071 |
|