QID 44069

Date Published: 2023-06-22

QID 44069: Arista EOS Improper Access Control Vulnerability (SA0086)

Arista EOS

Arista EOS is a fully programmable and highly modular, Linux-based network operation system, using familiar industry-standard CLI, and runs a single binary software image across the Arista switching family.

Affected EOS versions:
4.29.1F and below releases in the 4.29.x train
4.28.5M and below releases in the 4.28.x train
4.27.8M and below releases in the 4.27.x train
4.26.9M and below releases in the 4.26.x train
QID Detection Logic (Authenticated):
The check matches Arista EOS version retrieved via Unix Auth using "show version" command. NOTE: Detection is Practice as we are unable to check Required Configuration for Exploitation.

On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Refer to Arista Security Advisory SA0086 for patch details.

    CVEs related to QID 44069

    Software Advisories
    Advisory ID Software Component Link
    Security Advisory 0086 URL Logo www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086