Vulnerabilites related to Arista Networks - MOS
cve-2023-24547
Vulnerability from cvelistv5
Published
2023-12-05 23:29
Modified
2024-08-02 11:03
Summary
On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config.
Impacted products
Vendor Product Version
Arista Networks MOS Version: 0.13.0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:03:18.908Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "lessThanOrEqual": "0.39.4",
              "status": "affected",
              "version": "0.13.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIn order to be vulnerable to CVE-2023-24547 the following condition must be met:\u003c/p\u003e\u003cp\u003eA BGP password must be configured and be in plain text. An example of this is shown below:\u003c/p\u003e\u003cpre\u003eswitch\u0026gt;show running-config bgp\nrouter bgp 65000\n\u0026nbsp; \u0026nbsp;neighbor 192.0.2.1 remote-as 66000\n\u0026nbsp; \u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003eneighbor 192.0.2.1 password pA$$w0rd\u003c/span\u003e\n\u003c/pre\u003e\u003cp\u003eIf a BGP password is not configured there is no exposure to this issue.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "In order to be vulnerable to CVE-2023-24547 the following condition must be met:\n\nA BGP password must be configured and be in plain text. An example of this is shown below:\n\nswitch\u003eshow running-config bgp\nrouter bgp 65000\n\u00a0 \u00a0neighbor 192.0.2.1 remote-as 66000\n\u00a0 \u00a0neighbor 192.0.2.1 password pA$$w0rd\n\n\nIf a BGP password is not configured there is no exposure to this issue.\n\n\n"
        }
      ],
      "datePublic": "2023-12-05T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOn affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\u2019s running config. \u003c/span\u003e\u003c/b\u003e\u003cbr\u003e"
            }
          ],
          "value": "On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\u2019s running config. \n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-122",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-122 Privilege Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "cwe-212",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-05T23:29:01.375Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf\"\u003eMOS User Guide: Updating\u003c/a\u003e\u003c/p\u003e\u003cp\u003eCVE-2023-24547 has been fixed in the following releases:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMOS-0.36.10 and later releases in the MOS-0.36.x train\u003c/li\u003e\u003cli\u003eMOS-0.39.4 and later releases in the MOS-0.39.x train\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eBecause this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below:\u003c/p\u003e\u003cpre\u003eswitch\u0026gt;show running-config bgp\nrouter bgp 65000\n\u0026nbsp; \u0026nbsp;neighbor 192.0.2.1 remote-as 66000\n\u0026nbsp; \u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003eneighbor 192.0.2.1 password key 7 00143242404C5B140B\u003c/span\u003e\n\u003c/pre\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the  MOS User Guide: Updating https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf \n\nCVE-2023-24547 has been fixed in the following releases:\n\n  *  MOS-0.36.10 and later releases in the MOS-0.36.x train\n  *  MOS-0.39.4 and later releases in the MOS-0.39.x train\n\n\nBecause this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below:\n\nswitch\u003eshow running-config bgp\nrouter bgp 65000\n\u00a0 \u00a0neighbor 192.0.2.1 remote-as 66000\n\u00a0 \u00a0neighbor 192.0.2.1 password key 7 00143242404C5B140B\n\n\n\n\n"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003ch3\u003eHotfix\u003c/h3\u003e\u003cp\u003eThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above):\u003c/p\u003e\u003cul\u003e\u003cli\u003eMOS-0.39.3 and below releases in the MOS-0.39.x train\u003c/li\u003e\u003cli\u003eMOS-0.38.1 and below releases in the MOS-0.38.x train\u003c/li\u003e\u003cli\u003eMOS-0.37.1 and below releases in the MOS-0.37.x train\u003c/li\u003e\u003cli\u003eMOS-0.36.9 and below releases in the MOS-0.36.x train\u003c/li\u003e\u003cli\u003eMOS-0.35.3 and below releases in the MOS-0.35.x train\u003c/li\u003e\u003cli\u003eMOS-0.34.0 in the MOS-0.34.x train\u003c/li\u003e\u003c/ul\u003e\u003cp\u003ePlease note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used.\u003c/p\u003e\u003cpre\u003eVersion: 1.0\nURL: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm\"\u003ehotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm\u003c/a\u003e\nSWIX hash:(SHA512)\n168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cbr\u003e"
            }
          ],
          "value": "HotfixThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above):\n\n  *  MOS-0.39.3 and below releases in the MOS-0.39.x train\n  *  MOS-0.38.1 and below releases in the MOS-0.38.x train\n  *  MOS-0.37.1 and below releases in the MOS-0.37.x train\n  *  MOS-0.36.9 and below releases in the MOS-0.36.x train\n  *  MOS-0.35.3 and below releases in the MOS-0.35.x train\n  *  MOS-0.34.0 in the MOS-0.34.x train\n\n\nPlease note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used.\n\nVersion: 1.0\nURL:  hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm \nSWIX hash:(SHA512)\n168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997\n\n\n\u00a0\n\n\n"
        }
      ],
      "source": {
        "advisory": "90",
        "defect": [
          "BUG868319",
          "BUG873034",
          "MOS-2222",
          "MOS-2255."
        ],
        "discovery": "INTERNAL"
      },
      "title": "On Arista MOS configuration of a BGP password will cause the password to be logged in clear text.",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNo mitigation exists.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "No mitigation exists.\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24547",
    "datePublished": "2023-12-05T23:29:01.375Z",
    "dateReserved": "2023-01-26T11:37:43.827Z",
    "dateUpdated": "2024-08-02T11:03:18.908Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-6068
Vulnerability from cvelistv5
Published
2024-03-04 19:44
Modified
2024-08-02 08:21
Summary
On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some
Impacted products
Vendor Product Version
Arista Networks MOS Version: 1.7.1
Version: 1.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6068",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-04T21:18:50.615802Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-28T01:32:30.968Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.180Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "MultiAccess FPGA Software"
          ],
          "product": "MOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "status": "affected",
              "version": "1.7.1"
            },
            {
              "status": "affected",
              "version": "1.6"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIn order to be vulnerable to CVE-2023-6068, the following condition must be met:\u003c/p\u003e\u003cp\u003eMOS must be configured with MultiAccess FPGA software versions 1.7.1 or 1.6.x and can be determined by running the show version command and referring to the highlighted section as shown below.\u003c/p\u003e\u003cpre\u003eswitch(config)#show version\nDevice: Metamako MetaMux 48 with L-Series\nSKU: DCS-7130-48LB\nSerial number: M48LB-A3-27719-4\n   \nSoftware image version: 0.39.0alpha4\nInternal build ID: master+9345\n\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003eApplications: multiaccess-1.7.1\u003c/span\u003e\u003c/pre\u003e\u003cbr\u003e"
            }
          ],
          "value": "In order to be vulnerable to CVE-2023-6068, the following condition must be met:\n\nMOS must be configured with MultiAccess FPGA software versions 1.7.1 or 1.6.x and can be determined by running the show version command and referring to the highlighted section as shown below.\n\nswitch(config)#show version\nDevice: Metamako MetaMux 48 with L-Series\nSKU: DCS-7130-48LB\nSerial number: M48LB-A3-27719-4\n   \nSoftware image version: 0.39.0alpha4\nInternal build ID: master+9345\nApplications: multiaccess-1.7.1\n\n\n"
        }
      ],
      "datePublic": "2023-02-20T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL\u2019s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some"
            }
          ],
          "value": "On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL\u2019s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some"
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue was discovered internally and Arista is not aware of any malicious uses of this issue in customer networks.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "This issue was discovered internally and Arista is not aware of any malicious uses of this issue in customer networks.\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-283",
              "description": "CWE-283",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-04T19:44:08.620Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\u003c/p\u003e\u003cp\u003eCVE-2023-6068 has been fixed in the following releases:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMultiAccess FPGA 1.8.0 and later\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e"
            }
          ],
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-6068 has been fixed in the following releases:\n\n  *  MultiAccess FPGA 1.8.0 and later\n\n\n\n"
        }
      ],
      "source": {
        "defect": [
          "BUG 869667"
        ],
        "discovery": "INTERNAL"
      },
      "title": "On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL\u2019s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe workaround is to only apply one access-list to any particular port after the MultiAccess image is loaded into the FPGA. If a new access-list is to be applied to a port, the FPGA image should be reloaded after the access-list is applied.\u003c/p\u003e\u003cp\u003eRun the following commands to reload the FPGA image, where the line in yellow represents new access control lists to be added:\u003c/p\u003e\u003cpre\u003eswitch(config-app-multiaccess)#shut\nswitch(config-app-multiaccess)\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003e#multiaccess-group 0 client 0 access-list new_acl_if_need\u003c/span\u003e\nswitch(config-app-multiaccess)#no shut\n\u003c/pre\u003e\u003cp\u003eThe previous applied access control lists will automatically apply after FPGA reload.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "The workaround is to only apply one access-list to any particular port after the MultiAccess image is loaded into the FPGA. If a new access-list is to be applied to a port, the FPGA image should be reloaded after the access-list is applied.\n\nRun the following commands to reload the FPGA image, where the line in yellow represents new access control lists to be added:\n\nswitch(config-app-multiaccess)#shut\nswitch(config-app-multiaccess)#multiaccess-group 0 client 0 access-list new_acl_if_need\nswitch(config-app-multiaccess)#no shut\n\n\nThe previous applied access control lists will automatically apply after FPGA reload.\n\n\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-6068",
    "datePublished": "2024-03-04T19:44:08.620Z",
    "dateReserved": "2023-11-09T23:06:28.873Z",
    "dateUpdated": "2024-08-02T08:21:17.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}