CVE-2024-9448

7.5 HIGH

📋 TL;DR

Arista EOS devices with Traffic Policies configured fail to apply drop rules to untagged packets, allowing them to be forwarded instead of blocked. This affects network security by potentially delivering packets to unintended destinations. Organizations using Arista EOS with Traffic Policies are vulnerable.

💻 Affected Systems

Products:
  • Arista EOS
Versions: Affected versions per Arista advisory (check specific advisory for ranges)
Operating Systems: Arista EOS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with Traffic Policies configured; default configurations are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious untagged packets bypass security policies, reaching sensitive internal systems or causing network disruption.

🟠

Likely Case

Untagged traffic that should be dropped (e.g., malicious scans, policy violations) is forwarded, weakening network segmentation and security controls.

🟢

If Mitigated

With proper network segmentation and additional controls, impact is limited to potential policy bypass in specific traffic flows.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending untagged packets to affected devices; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Arista advisory for fixed versions

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisory/21121-security-advisory-0112

Restart Required: Yes

Instructions:

1. Review Arista advisory for fixed EOS versions. 2. Upgrade affected devices to patched version. 3. Restart devices to apply changes.

🔧 Temporary Workarounds

Disable Traffic Policies

all

Remove or disable Traffic Policies if not required, eliminating the vulnerability.

no traffic-policy <policy-name>

Tag All Incoming Packets

all

Configure network to tag all packets before they reach affected devices, bypassing the untagged packet issue.

interface <interface-name>
switchport trunk allowed vlan <vlan-id>

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected devices and limit potential impact.
  • Use additional firewall rules or ACLs to block untagged traffic at network boundaries.

🔍 How to Verify

Check if Vulnerable:

Check if Traffic Policies are configured on Arista EOS devices and verify version against advisory.

Check Version:

show version | include Software image version

Verify Fix Applied:

After patching, test with untagged packets to confirm Traffic Policy drop rules are applied correctly.

📡 Detection & Monitoring

Log Indicators:

  • Logs showing untagged packets being forwarded despite drop rules in Traffic Policies.

Network Indicators:

  • Network traffic analysis revealing untagged packets bypassing expected filters.

SIEM Query:

Example: search for 'untagged packet forwarded' or 'traffic policy bypass' in network device logs.

🔗 References

📤 Share & Export