CVE-2023-24509

9.3 CRITICAL

📋 TL;DR

This vulnerability allows an existing unprivileged user with valid credentials to log into the standby supervisor module as root, leading to privilege escalation on affected Arista EOS platforms. It affects modular platforms running Arista EOS with redundant supervisor modules configured with RPR or SSO redundancy protocols. Attackers need valid user credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Arista EOS (Extensible Operating System)
Versions: Multiple versions prior to fixed releases
Operating Systems: Arista EOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects modular platforms with redundant supervisor modules configured with RPR (Route Processor Redundancy) or SSO (Stateful Switchover) redundancy protocols.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network infrastructure with root access to standby supervisor, potentially allowing persistence, configuration changes, traffic interception, and lateral movement to other network devices.

🟠

Likely Case

Privilege escalation from unprivileged user to root on standby supervisor, enabling unauthorized configuration changes, monitoring of network traffic, and potential disruption of redundancy failover mechanisms.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and monitoring are in place, though the vulnerability still provides unauthorized root access to standby supervisor.

🌐 Internet-Facing: LOW - Requires access to management interfaces which should not be internet-facing in proper configurations.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this to gain root privileges on critical network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid user credentials and access to affected configuration. Exploitation is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions available - see Arista advisory for specific version mappings

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082

Restart Required: Yes

Instructions:

1. Review Arista advisory for specific fixed versions for your platform. 2. Schedule maintenance window. 3. Upgrade standby supervisor first. 4. Perform switchover. 5. Upgrade former active supervisor. 6. Verify redundancy operation.

🔧 Temporary Workarounds

Disable redundant supervisor configuration

all

Remove RPR or SSO redundancy configuration to eliminate vulnerability vector

configure
no redundancy
write memory

Restrict access to management interfaces

all

Implement strict access controls and network segmentation for management interfaces

🧯 If You Can't Patch

  • Implement strict access controls and monitor all authentication attempts to management interfaces
  • Segment management network and restrict access to only authorized administrators using jump hosts or bastion servers

🔍 How to Verify

Check if Vulnerable:

Check if platform has redundant supervisors with RPR or SSO configured: 'show redundancy' and verify EOS version against affected versions in Arista advisory

Check Version:

show version | include Software image version

Verify Fix Applied:

Verify EOS version is updated to fixed version: 'show version' and confirm redundancy configuration still functions properly

📡 Detection & Monitoring

Log Indicators:

  • Unexpected root logins on standby supervisor
  • Authentication events from non-admin users on standby supervisor
  • Configuration changes from standby supervisor

Network Indicators:

  • Management traffic to standby supervisor from unexpected sources
  • SSH/Telnet connections to standby supervisor management interfaces

SIEM Query:

source="arista-switch" AND (event_type="authentication" AND user="root" AND supervisor="standby") OR (event_type="configuration_change" AND source="standby_supervisor")

🔗 References

📤 Share & Export