CVE-2024-5872

6.5 MEDIUM

📋 TL;DR

This vulnerability in Arista EOS allows specially crafted packets with incorrect VLAN tags to be incorrectly processed by the control plane, potentially causing route instability and incorrect multicast route learning. It affects Arista EOS platforms running vulnerable versions. Network administrators managing Arista switches should be concerned.

💻 Affected Systems

Products:
  • Arista EOS
Versions: Multiple versions as specified in Arista advisory
Operating Systems: Arista EOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects platforms running vulnerable EOS versions. Check Arista advisory for specific affected versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained network instability causing widespread routing flaps, incorrect multicast routing leading to traffic blackholing, and potential denial of service for critical network services.

🟠

Likely Case

Intermittent route flapping and temporary multicast routing issues causing localized network performance degradation and connectivity problems.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to malicious packets.

🌐 Internet-Facing: MEDIUM - Requires packets to reach vulnerable interfaces, but internet-facing interfaces could be targeted if not properly filtered.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could exploit this to disrupt network operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific malformed packets but does not require authentication. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Arista advisory for specific fixed versions

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisory/20649-security-advisory-0106

Restart Required: Yes

Instructions:

1. Review Arista advisory for affected versions. 2. Download and install the fixed EOS version from Arista support. 3. Schedule maintenance window for switch reboot. 4. Apply update following Arista's upgrade procedures.

🔧 Temporary Workarounds

Implement ACL filtering

all

Apply access control lists to filter malformed VLAN packets before they reach vulnerable interfaces

ip access-list standard VLAN-FILTER
deny any vlan malformed
permit any
interface EthernetX
ip access-group VLAN-FILTER in

Network segmentation

all

Segment network to limit exposure of vulnerable interfaces to untrusted traffic

🧯 If You Can't Patch

  • Implement strict ingress filtering on all interfaces to block malformed VLAN packets
  • Isolate vulnerable switches from untrusted networks and implement network monitoring for anomalous routing behavior

🔍 How to Verify

Check if Vulnerable:

Check EOS version with 'show version' and compare against affected versions in Arista advisory

Check Version:

show version | include Software image version

Verify Fix Applied:

Verify installed version matches fixed version from advisory and monitor for routing stability

📡 Detection & Monitoring

Log Indicators:

  • Unexpected route flaps in routing tables
  • Abnormal BGP/OSPF neighbor state changes
  • Multicast routing table inconsistencies

Network Indicators:

  • Increased routing protocol updates
  • Unstable network paths
  • Multicast traffic anomalies

SIEM Query:

source="arista-switch" AND ("route flap" OR "neighbor down" OR "multicast route change")

🔗 References

📤 Share & Export