QID 43996

Date Published: 2023-03-27

QID 43996: Arista EOS Improper Privilege Management Vulnerability (SA0082)

Arista EOS

Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry-standard CLI, and runs a single binary software image across the Arista switching family.

Affected EOS versions:
4.28.3M and below releases in the 4.28.x train
4.27.6M and below releases in the 4.27.x train
4.26.8M and below releases in the 4.26.x train
4.25.9M and below releases in the 4.25.x train
4.24.10M and below releases in the 4.24.x train
4.23.13M and below releases in the 4.23.x train
QID Detection Logic (Authenticated):
The check matches Arista EOS version retrieved via Unix Auth using "show version" command.

Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.

  • CVSS V3 rated as Critical - 9.3 severity.
  • CVSS V2 rated as Medium - 4.6 severity.
  • Solution
    Refer to Arista Security Advisory SA0082 for patch details.

    CVEs related to QID 43996

    Software Advisories
    Advisory ID Software Component Link
    Security Advisory 0082 URL Logo www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082