QID 44004

Date Published: 2023-03-27

QID 44004: Arista EOS Improper Access Control Vulnerability (SA0078)

Arista EOS

Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry-standard CLI, and runs a single binary software image across the Arista switching family.

Affected EOS versions:
4.24.9 and below releases in the 4.24.x release train
4.25.8 and below releases in the 4.25.x release train
4.26.5 and below releases in the 4.26.x release train
4.27.3 and below releases in the 4.27.x release train
QID Detection Logic (Authenticated):
The check matches Arista EOS version retrieved via Unix Auth using "show version" command.

The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could allow a host with an IP address in a range that matches the range allowed by a NAT ACL and a range denied by a Security ACL to be forwarded incorrectly as it should have been denied by the Security ACL. This can enable an ACL bypass.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Refer to Arista Security Advisory SA0078 for patch details.

    CVEs related to QID 44004

    Software Advisories
    Advisory ID Software Component Link
    Security Advisory 0078 URL Logo www.arista.com/en/support/advisories-notices/security-advisory/15862-security-advisory-0078