On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading t ...
CVE-2023-24509
9.3CRITICAL
What is CVE-2023-24509?
A privilege escalation vulnerability exists in modular platforms running Arista EOS when equipped with redundant supervisor modules configured with RPR or SSO. An attacker with valid unprivileged user credentials can exploit this flaw to log into the standby supervisor as a root user, granting them elevated privileges. This may enable unauthorized access to sensitive system functions and resources, enhancing the potential for further exploitation.
Affected Version(s)
Arista EOS 4.23.0 4.23.13M
Arista EOS 4.28.0 <= 4.28.3M
Arista EOS 4.27.0 <= 4.27.6M
References
CVSS V3.1
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Arista would like to acknowledge and thank Marc-André Labonté, Senior Information Security Analyst at Desjardins for responsibly reporting CVE-2023-24509.
