CVE-2021-28503

7.4 HIGH

📋 TL;DR

Arista EOS eAPI authentication bypass vulnerability allows remote attackers to access network devices without proper credential validation when certificate-based authentication is enabled. This affects Arista EOS devices with eAPI configured. Attackers could gain unauthorized administrative access to network infrastructure.

💻 Affected Systems

Products:
  • Arista EOS (Extensible Operating System)
Versions: All versions prior to 4.24.6M, 4.25.4M, 4.26.2M, and 4.27.0F
Operating Systems: Arista EOS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with eAPI enabled and using certificate-based authentication. SSH and other management interfaces are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network device allowing configuration changes, traffic interception, lateral movement to other systems, and network disruption.

🟠

Likely Case

Unauthorized access to device configuration and management functions, potential data exfiltration, and network reconnaissance.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect unauthorized access attempts.

🌐 Internet-Facing: HIGH - eAPI exposed to internet would allow direct exploitation by any remote attacker.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to gain elevated network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to eAPI endpoint and knowledge of certificate authentication bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.24.6M, 4.25.4M, 4.26.2M, 4.27.0F and later

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisories/13605-security-advisory-0072

Restart Required: Yes

Instructions:

1. Download appropriate fixed EOS version from Arista support portal. 2. Backup device configuration. 3. Install new EOS version using 'copy' and 'boot system' commands. 4. Reload device to apply update.

🔧 Temporary Workarounds

Disable eAPI

all

Temporarily disable eAPI management interface if not required

no management api http-commands
no management api https-commands

Use SSH authentication only

all

Disable certificate-based authentication and use SSH with strong credentials

aaa authentication login default local
aaa authorization exec default local

🧯 If You Can't Patch

  • Implement strict network access controls to limit eAPI access to trusted management networks only
  • Enable detailed logging and monitoring for eAPI authentication events and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check EOS version with 'show version' and verify if running vulnerable version. Check eAPI status with 'show management api http-commands'.

Check Version:

show version | include Software image version

Verify Fix Applied:

Verify EOS version is patched with 'show version'. Test eAPI authentication with certificate to ensure proper credential validation.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful eAPI access
  • Unexpected eAPI connections from unauthorized sources
  • Configuration changes from unexpected sources

Network Indicators:

  • Unusual eAPI traffic patterns
  • eAPI connections from non-management networks
  • Multiple authentication attempts on eAPI port

SIEM Query:

source="arista-eos" (event_type="authentication" AND result="success" AND auth_method="certificate") OR (event_type="api_access" AND source_ip NOT IN allowed_management_ips)

🔗 References

📤 Share & Export