CVE-2021-28494

9.6 CRITICAL

📋 TL;DR

This vulnerability allows unprivileged users to bypass authentication in Arista's Metamako Operating System Web UI under certain conditions. It affects Arista 7130 product line devices running MOS-0.34.0 and earlier versions. Attackers could gain unauthorized access to network devices without valid credentials.

💻 Affected Systems

Products:
  • Arista 7130 product line
Versions: MOS-0.34.0 and prior releases
Operating Systems: Arista Metamako Operating System (MOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Web UI access specifically. Requires certain conditions to trigger the authentication bypass.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network devices allowing configuration changes, traffic interception, network disruption, and lateral movement to other systems.

🟠

Likely Case

Unauthorized access to network device management interfaces leading to configuration changes, monitoring of network traffic, and potential denial of service.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict access controls, but authentication bypass still presents significant risk.

🌐 Internet-Facing: HIGH - Web UI exposed to internet would allow remote attackers to bypass authentication without any credentials.
🏢 Internal Only: HIGH - Even internally, unprivileged users or compromised internal systems could exploit this to gain unauthorized access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity once the specific conditions are understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MOS-0.35.0 and later

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisories/12916-security-advisory-68

Restart Required: Yes

Instructions:

1. Download MOS-0.35.0 or later from Arista support portal. 2. Backup current configuration. 3. Install the updated MOS version following Arista's upgrade procedures. 4. Reboot the device to apply changes. 5. Verify the new version is running.

🔧 Temporary Workarounds

Disable Web UI Access

all

Temporarily disable Web UI access and use CLI/API management only

no management api http-commands
no management api https-commands

Restrict Network Access

all

Implement strict network access controls to limit who can reach the Web UI

management access-list standard <ACL_NAME>
permit <TRUSTED_NETWORKS>
management api http-commands access-class <ACL_NAME>

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to affected devices
  • Disable Web UI entirely and use CLI/API management with proper authentication controls

🔍 How to Verify

Check if Vulnerable:

Check MOS version with 'show version' command. If version is MOS-0.34.0 or earlier, device is vulnerable.

Check Version:

show version | include MOS

Verify Fix Applied:

After patching, verify version is MOS-0.35.0 or later using 'show version' command and test authentication bypass is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unauthorized access to Web UI from unexpected sources
  • Configuration changes from unauthenticated users

Network Indicators:

  • HTTP/HTTPS traffic to Web UI without proper authentication sequences
  • Unusual patterns of access to management interfaces

SIEM Query:

source="arista-device" AND (event_type="auth_failure" AND event_type="auth_success" within 5s) OR (http_user_agent="*" AND NOT auth_success)

🔗 References

📤 Share & Export