9.3

CVE-2023-24509

Exploit

On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AristaEos Version >= 4.23 <= 4.23.13m
   Arista704x3 Version-
   Arista7304x Version-
   Arista7304x3 Version-
   Arista7308x Version-
   Arista7316x Version-
   Arista7324x Version-
   Arista7328x Version-
   Arista7504r Version-
   Arista7504r3 Version-
   Arista7508r Version-
   Arista7508r3 Version-
   Arista7512r Version-
   Arista7512r3 Version-
   Arista7516r Version-
   Arista755x Version-
   Arista758x Version-
   Arista7804r3 Version-
   Arista7808r3 Version-
   Arista7812r3 Version-
   Arista7816r3 Version-
AristaEos Version >= 4.24.0 < 4.24.11m
   Arista704x3 Version-
   Arista7304x Version-
   Arista7304x3 Version-
   Arista7308x Version-
   Arista7316x Version-
   Arista7324x Version-
   Arista7328x Version-
   Arista7504r Version-
   Arista7504r3 Version-
   Arista7508r Version-
   Arista7508r3 Version-
   Arista7512r Version-
   Arista7512r3 Version-
   Arista7516r Version-
   Arista755x Version-
   Arista758x Version-
   Arista7804r3 Version-
   Arista7808r3 Version-
   Arista7812r3 Version-
   Arista7816r3 Version-
AristaEos Version >= 4.25.0 < 4.25.10m
   Arista704x3 Version-
   Arista7304x Version-
   Arista7304x3 Version-
   Arista7308x Version-
   Arista7316x Version-
   Arista7324x Version-
   Arista7328x Version-
   Arista7504r Version-
   Arista7504r3 Version-
   Arista7508r Version-
   Arista7508r3 Version-
   Arista7512r Version-
   Arista7512r3 Version-
   Arista7516r Version-
   Arista755x Version-
   Arista758x Version-
   Arista7804r3 Version-
   Arista7808r3 Version-
   Arista7812r3 Version-
   Arista7816r3 Version-
AristaEos Version >= 4.26.0 < 4.26.9m
   Arista704x3 Version-
   Arista7304x Version-
   Arista7304x3 Version-
   Arista7308x Version-
   Arista7316x Version-
   Arista7324x Version-
   Arista7328x Version-
   Arista7504r Version-
   Arista7504r3 Version-
   Arista7508r Version-
   Arista7508r3 Version-
   Arista7512r Version-
   Arista7512r3 Version-
   Arista7516r Version-
   Arista755x Version-
   Arista758x Version-
   Arista7804r3 Version-
   Arista7808r3 Version-
   Arista7812r3 Version-
   Arista7816r3 Version-
AristaEos Version >= 4.27.0 < 4.27.7m
   Arista704x3 Version-
   Arista7304x Version-
   Arista7304x3 Version-
   Arista7308x Version-
   Arista7316x Version-
   Arista7324x Version-
   Arista7328x Version-
   Arista7504r Version-
   Arista7504r3 Version-
   Arista7508r Version-
   Arista7508r3 Version-
   Arista7512r Version-
   Arista7512r3 Version-
   Arista7516r Version-
   Arista755x Version-
   Arista758x Version-
   Arista7804r3 Version-
   Arista7808r3 Version-
   Arista7812r3 Version-
   Arista7816r3 Version-
AristaEos Version >= 4.28.0 < 4.28.4m
   Arista704x3 Version-
   Arista7304x Version-
   Arista7304x3 Version-
   Arista7308x Version-
   Arista7316x Version-
   Arista7324x Version-
   Arista7328x Version-
   Arista7504r Version-
   Arista7504r3 Version-
   Arista7508r Version-
   Arista7508r3 Version-
   Arista7512r Version-
   Arista7512r3 Version-
   Arista7516r Version-
   Arista755x Version-
   Arista758x Version-
   Arista7804r3 Version-
   Arista7808r3 Version-
   Arista7812r3 Version-
   Arista7816r3 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.169
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
psirt@arista.com 9.3 2.5 6
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.