CVE-2023-24510

7.5 HIGH

📋 TL;DR

This vulnerability in Arista EOS DHCP relay agent allows an attacker to cause a denial of service by sending a malformed DHCP packet, leading to the agent restarting. It affects Arista switches and routers running vulnerable EOS versions, potentially disrupting network services.

💻 Affected Systems

Products:
  • Arista switches and routers with DHCP relay functionality
Versions: EOS versions prior to the fixed releases specified in the advisory
Operating Systems: Arista EOS
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with DHCP relay enabled are vulnerable; disabling DHCP relay mitigates the risk but may not be feasible in all environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Repeated exploitation could cause persistent DHCP relay failures, leading to network outages and service disruption for DHCP-dependent devices.

🟠

Likely Case

Intermittent DHCP relay restarts causing temporary loss of DHCP services, resulting in devices failing to obtain IP addresses.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments, minimizing overall disruption.

🌐 Internet-Facing: MEDIUM, as DHCP relay agents are typically not directly internet-facing, but could be exposed in misconfigured or edge network setups.
🏢 Internal Only: HIGH, since internal attackers or compromised devices could exploit this to disrupt DHCP services across the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a malformed DHCP packet to the DHCP relay agent, which is straightforward if network access is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Arista advisory for specific fixed EOS versions

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087

Restart Required: Yes

Instructions:

1. Review the Arista advisory to identify the fixed EOS version for your hardware. 2. Download and install the patched EOS version from Arista support. 3. Reboot the device to apply the update. 4. Verify the update using version check commands.

🔧 Temporary Workarounds

Disable DHCP relay

all

Temporarily disable the DHCP relay agent to prevent exploitation, but this will break DHCP services for relayed networks.

configure terminal
no ip dhcp relay

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to DHCP relay agents from untrusted networks.
  • Use ACLs to block malformed DHCP packets at network boundaries or on affected devices.

🔍 How to Verify

Check if Vulnerable:

Check the EOS version on Arista devices; if it is prior to the fixed versions listed in the advisory and DHCP relay is enabled, the device is vulnerable.

Check Version:

show version | include Software image version

Verify Fix Applied:

After patching, confirm the EOS version is updated to a fixed release and test DHCP relay functionality to ensure it operates without restarting under normal traffic.

📡 Detection & Monitoring

Log Indicators:

  • Log entries indicating DHCP relay agent restarts or crashes in system logs

Network Indicators:

  • Unusual DHCP packet patterns or spikes in DHCP traffic to relay agents

SIEM Query:

Example: 'source="arista-device" AND (event="dhcp_relay_restart" OR event="process_crash")'

🔗 References

📤 Share & Export