On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch.
CVE-2023-24512

8.8HIGH

Key Information:

Vendor
CVE Published:
25 April 2023

What is CVE-2023-24512?

On systems running Arista EOS, a vulnerability exists that allows an authorized attacker with permissions to issue gNMI requests to manipulate configurations on the switch. This risk is present specifically when the Streaming Telemetry Agent, known as the TerminAttr agent, is enabled and gNMI access is set up. Attackers may exploit this situation to modify arbitrary settings, posing a significant risk to network integrity, particularly in environments streaming data to third-party systems.

Affected Version(s)

Terminattr 1.23.0

Terminattr <= 1.19.5

Terminattr 1.24.0 <= 1.24.3

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-24512 : On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch.