Unprivileged user can escalate privileges on Arista EOS running redundant supervisor modules. Immediate fixes and long-term security practices recommended.
This CVE affects modular platforms running Arista EOS with redundant supervisor modules and configured redundancy protocol, potentially allowing an unprivileged user to escalate privileges.
Understanding CVE-2023-24509
This vulnerability in Arista EOS could enable an existing unprivileged user to log in to the standby supervisor as a root user, leading to privilege escalation.
What is CVE-2023-24509?
Arista EOS equipped with redundant supervisor modules and configured with redundancy protocols such as RPR or SSO may allow unauthorized privilege escalation by an unprivileged user.
The Impact of CVE-2023-24509
The impact of this vulnerability could lead to unauthorized access and privilege escalation, posing a significant risk to the security of affected systems.
Technical Details of CVE-2023-24509
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability allows an unprivileged user to gain root access on the standby supervisor of affected Arista EOS platforms, potentially leading to unauthorized system control.
Affected Systems and Versions
Arista EOS versions affected by CVE-2023-24509 include 4.23.0 to 4.23.13M, 4.28.0 to 4.28.3M, 4.27.0 to 4.27.6M, 4.286.0 to 4.26.8M, 4.25.0 to 4.25.9M, and 4.24.0 to 4.24.10M.
Exploitation Mechanism
To exploit this vulnerability, an attacker needs valid user credentials to log in to the standby supervisor as a root user, thereby escalating privileges.
Mitigation and Prevention
It is crucial to take immediate steps and implement long-term security practices to mitigate the risks associated with CVE-2023-24509.
Immediate Steps to Take
One immediate step is to disable the "ssh" CLI command in unprivileged mode on SSH client devices using command authorization and Role-Based Access Control (RBAC).
Long-Term Security Practices
To enhance security, upgrade to the latest remediated software version recommended by Arista. Ensure that all fixes for CVE-2023-24509 are included in the upgrade.
Patching and Updates
Arista has released fixed versions for CVE-2023-24509. Ensure you upgrade to the following releases or apply the provided hotfix to remediate the vulnerability.
Remember that neglecting to apply the necessary patches or upgrades could leave your system vulnerable to exploitation of this critical security issue.