CVE-2024-8000

5.3 MEDIUM

📋 TL;DR

This vulnerability affects Arista EOS devices with 802.1X authentication configured. During Accelerated Software Upgrade (ASU) restarts, only the first line of dynamic ACLs from AAA servers is installed, potentially allowing unauthorized network access. Supplicants with pending captive-portal authentication during ASU are impacted.

💻 Affected Systems

Products:
  • Arista EOS
Versions: Affected version range
Operating Systems: Arista EOS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with 802.1X authentication configured and during Accelerated Software Upgrade (ASU) restarts

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass network access controls and gain unauthorized access to restricted network segments, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Users with pending captive-portal authentication may receive incorrect network access permissions, potentially accessing resources they shouldn't have access to.

🟢

If Mitigated

With proper network segmentation and monitoring, the impact is limited to temporary access control misconfigurations affecting only specific supplicants during ASU events.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific timing during ASU restarts and affects only supplicants with pending captive-portal authentication

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version that fixes this

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisory/21086-security-advisory-0109

Restart Required: Yes

Instructions:

Step-by-step patching instructions

🔧 Temporary Workarounds

Disable ASU during maintenance windows

all

Avoid using Accelerated Software Upgrade when 802.1X authentication is critical

Monitor for pending captive-portal authentications

all

Track and manage supplicants with pending authentication before ASU events

🧯 If You Can't Patch

  • Implement additional network segmentation for devices using 802.1X
  • Increase monitoring of network access during and after ASU events

🔍 How to Verify

Check if Vulnerable:

Check if running affected Arista EOS versions with 802.1X configured and ASU capability

Check Version:

show version

Verify Fix Applied:

Verify patch installation and test dynamic ACL installation after ASU restart

📡 Detection & Monitoring

Log Indicators:

  • ASU restart events with 802.1X authentication
  • Dynamic ACL installation failures
  • Captive-portal authentication anomalies

Network Indicators:

  • Unexpected network access patterns after ASU events
  • ACL rule mismatches

SIEM Query:

Example SIEM/detection query if applicable

🔗 References

📤 Share & Export