CVE-2023-24547 (GCVE-0-2023-24547)

Vulnerability from cvelistv5 – Published: 2023-12-05 23:29 – Updated: 2025-05-28 15:54
VLAI?
Summary
On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config.
CWE
  • cwe-212
Assigner
Impacted products
Vendor Product Version
Arista Networks MOS Affected: 0.13.0 , ≤ 0.39.4 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T11:03:18.908Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-24547",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T15:53:26.982400Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T15:54:35.342Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MOS",
          "vendor": "Arista Networks",
          "versions": [
            {
              "lessThanOrEqual": "0.39.4",
              "status": "affected",
              "version": "0.13.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIn order to be vulnerable to CVE-2023-24547 the following condition must be met:\u003c/p\u003e\u003cp\u003eA BGP password must be configured and be in plain text. An example of this is shown below:\u003c/p\u003e\u003cpre\u003eswitch\u0026gt;show running-config bgp\nrouter bgp 65000\n\u0026nbsp; \u0026nbsp;neighbor 192.0.2.1 remote-as 66000\n\u0026nbsp; \u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003eneighbor 192.0.2.1 password pA$$w0rd\u003c/span\u003e\n\u003c/pre\u003e\u003cp\u003eIf a BGP password is not configured there is no exposure to this issue.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "In order to be vulnerable to CVE-2023-24547 the following condition must be met:\n\nA BGP password must be configured and be in plain text. An example of this is shown below:\n\nswitch\u003eshow running-config bgp\nrouter bgp 65000\n\u00a0 \u00a0neighbor 192.0.2.1 remote-as 66000\n\u00a0 \u00a0neighbor 192.0.2.1 password pA$$w0rd\n\n\nIf a BGP password is not configured there is no exposure to this issue.\n\n\n"
        }
      ],
      "datePublic": "2023-12-05T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cb\u003e\u003cspan style=\"background-color: transparent;\"\u003eOn affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\u2019s running config. \u003c/span\u003e\u003c/b\u003e\u003cbr\u003e"
            }
          ],
          "value": "On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\u2019s running config. \n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-122",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-122 Privilege Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "cwe-212",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-05T23:29:01.375Z",
        "orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
        "shortName": "Arista"
      },
      "references": [
        {
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf\"\u003eMOS User Guide: Updating\u003c/a\u003e\u003c/p\u003e\u003cp\u003eCVE-2023-24547 has been fixed in the following releases:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMOS-0.36.10 and later releases in the MOS-0.36.x train\u003c/li\u003e\u003cli\u003eMOS-0.39.4 and later releases in the MOS-0.39.x train\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eBecause this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below:\u003c/p\u003e\u003cpre\u003eswitch\u0026gt;show running-config bgp\nrouter bgp 65000\n\u0026nbsp; \u0026nbsp;neighbor 192.0.2.1 remote-as 66000\n\u0026nbsp; \u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003eneighbor 192.0.2.1 password key 7 00143242404C5B140B\u003c/span\u003e\n\u003c/pre\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the  MOS User Guide: Updating https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf \n\nCVE-2023-24547 has been fixed in the following releases:\n\n  *  MOS-0.36.10 and later releases in the MOS-0.36.x train\n  *  MOS-0.39.4 and later releases in the MOS-0.39.x train\n\n\nBecause this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below:\n\nswitch\u003eshow running-config bgp\nrouter bgp 65000\n\u00a0 \u00a0neighbor 192.0.2.1 remote-as 66000\n\u00a0 \u00a0neighbor 192.0.2.1 password key 7 00143242404C5B140B\n\n\n\n\n"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003ch3\u003eHotfix\u003c/h3\u003e\u003cp\u003eThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above):\u003c/p\u003e\u003cul\u003e\u003cli\u003eMOS-0.39.3 and below releases in the MOS-0.39.x train\u003c/li\u003e\u003cli\u003eMOS-0.38.1 and below releases in the MOS-0.38.x train\u003c/li\u003e\u003cli\u003eMOS-0.37.1 and below releases in the MOS-0.37.x train\u003c/li\u003e\u003cli\u003eMOS-0.36.9 and below releases in the MOS-0.36.x train\u003c/li\u003e\u003cli\u003eMOS-0.35.3 and below releases in the MOS-0.35.x train\u003c/li\u003e\u003cli\u003eMOS-0.34.0 in the MOS-0.34.x train\u003c/li\u003e\u003c/ul\u003e\u003cp\u003ePlease note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used.\u003c/p\u003e\u003cpre\u003eVersion: 1.0\nURL: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm\"\u003ehotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm\u003c/a\u003e\nSWIX hash:(SHA512)\n168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cbr\u003e"
            }
          ],
          "value": "HotfixThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above):\n\n  *  MOS-0.39.3 and below releases in the MOS-0.39.x train\n  *  MOS-0.38.1 and below releases in the MOS-0.38.x train\n  *  MOS-0.37.1 and below releases in the MOS-0.37.x train\n  *  MOS-0.36.9 and below releases in the MOS-0.36.x train\n  *  MOS-0.35.3 and below releases in the MOS-0.35.x train\n  *  MOS-0.34.0 in the MOS-0.34.x train\n\n\nPlease note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used.\n\nVersion: 1.0\nURL:  hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm \nSWIX hash:(SHA512)\n168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997\n\n\n\u00a0\n\n\n"
        }
      ],
      "source": {
        "advisory": "90",
        "defect": [
          "BUG868319",
          "BUG873034",
          "MOS-2222",
          "MOS-2255."
        ],
        "discovery": "INTERNAL"
      },
      "title": "On Arista MOS configuration of a BGP password will cause the password to be logged in clear text.",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNo mitigation exists.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "No mitigation exists.\n"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
    "assignerShortName": "Arista",
    "cveId": "CVE-2023-24547",
    "datePublished": "2023-12-05T23:29:01.375Z",
    "dateReserved": "2023-01-26T11:37:43.827Z",
    "dateUpdated": "2025-05-28T15:54:35.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arista:mos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"0.13.0\", \"versionEndIncluding\": \"0.39.4\", \"matchCriteriaId\": \"924F1DE2-DEEB-4CC8-97CA-8D9B5E53F4BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D832798-DA45-4F9E-AA31-5D088253A28A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arista:7130-16g3s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFFA321D-F4A5-434C-BB39-D2B2687001D6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arista:7130-48g3s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2BE67B8-F326-48B7-AB82-04FE8C2E37E2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arista:7130-96s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3264E086-4E90-41D0-8583-8FCF3CE4885D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\\u2019s running config. \\n\"}, {\"lang\": \"es\", \"value\": \"En las plataformas afectadas que ejecutan Arista MOS, la configuraci\\u00f3n de una contrase\\u00f1a BGP har\\u00e1 que la contrase\\u00f1a se registre en texto plano que los usuarios autenticados pueden revelar en registros locales o servidores de registro remotos, adem\\u00e1s de aparecer en texto plano en la configuraci\\u00f3n en ejecuci\\u00f3n del dispositivo.\"}]",
      "id": "CVE-2023-24547",
      "lastModified": "2024-11-21T07:48:05.987",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@arista.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.7, \"impactScore\": 5.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
      "published": "2023-12-06T00:15:07.030",
      "references": "[{\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090\", \"source\": \"psirt@arista.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@arista.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-319\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-24547\",\"sourceIdentifier\":\"psirt@arista.com\",\"published\":\"2023-12-06T00:15:07.030\",\"lastModified\":\"2024-11-21T07:48:05.987\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\u2019s running config. \\n\"},{\"lang\":\"es\",\"value\":\"En las plataformas afectadas que ejecutan Arista MOS, la configuraci\u00f3n de una contrase\u00f1a BGP har\u00e1 que la contrase\u00f1a se registre en texto plano que los usuarios autenticados pueden revelar en registros locales o servidores de registro remotos, adem\u00e1s de aparecer en texto plano en la configuraci\u00f3n en ejecuci\u00f3n del dispositivo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@arista.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:mos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.13.0\",\"versionEndIncluding\":\"0.39.4\",\"matchCriteriaId\":\"924F1DE2-DEEB-4CC8-97CA-8D9B5E53F4BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arista:7130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D832798-DA45-4F9E-AA31-5D088253A28A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arista:7130-16g3s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFFA321D-F4A5-434C-BB39-D2B2687001D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arista:7130-48g3s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2BE67B8-F326-48B7-AB82-04FE8C2E37E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arista:7130-96s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3264E086-4E90-41D0-8583-8FCF3CE4885D\"}]}]}],\"references\":[{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090\",\"source\":\"psirt@arista.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T11:03:18.908Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-24547\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-28T15:53:26.982400Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-28T15:54:31.555Z\"}}], \"cna\": {\"title\": \"On Arista MOS configuration of a BGP password will cause the password to be logged in clear text.\", \"source\": {\"defect\": [\"BUG868319\", \"BUG873034\", \"MOS-2222\", \"MOS-2255.\"], \"advisory\": \"90\", \"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-122\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-122 Privilege Abuse\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Arista Networks\", \"product\": \"MOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.13.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"0.39.4\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the  MOS User Guide: Updating https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf \\n\\nCVE-2023-24547 has been fixed in the following releases:\\n\\n  *  MOS-0.36.10 and later releases in the MOS-0.36.x train\\n  *  MOS-0.39.4 and later releases in the MOS-0.39.x train\\n\\n\\nBecause this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below:\\n\\nswitch\u003eshow running-config bgp\\nrouter bgp 65000\\n\\u00a0 \\u00a0neighbor 192.0.2.1 remote-as 66000\\n\\u00a0 \\u00a0neighbor 192.0.2.1 password key 7 00143242404C5B140B\\n\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf\\\"\u003eMOS User Guide: Updating\u003c/a\u003e\u003c/p\u003e\u003cp\u003eCVE-2023-24547 has been fixed in the following releases:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMOS-0.36.10 and later releases in the MOS-0.36.x train\u003c/li\u003e\u003cli\u003eMOS-0.39.4 and later releases in the MOS-0.39.x train\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eBecause this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below:\u003c/p\u003e\u003cpre\u003eswitch\u0026gt;show running-config bgp\\nrouter bgp 65000\\n\u0026nbsp; \u0026nbsp;neighbor 192.0.2.1 remote-as 66000\\n\u0026nbsp; \u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 0);\\\"\u003eneighbor 192.0.2.1 password key 7 00143242404C5B140B\u003c/span\u003e\\n\u003c/pre\u003e\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}, {\"lang\": \"en\", \"value\": \"HotfixThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above):\\n\\n  *  MOS-0.39.3 and below releases in the MOS-0.39.x train\\n  *  MOS-0.38.1 and below releases in the MOS-0.38.x train\\n  *  MOS-0.37.1 and below releases in the MOS-0.37.x train\\n  *  MOS-0.36.9 and below releases in the MOS-0.36.x train\\n  *  MOS-0.35.3 and below releases in the MOS-0.35.x train\\n  *  MOS-0.34.0 in the MOS-0.34.x train\\n\\n\\nPlease note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used.\\n\\nVersion: 1.0\\nURL:  hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm \\nSWIX hash:(SHA512)\\n168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997\\n\\n\\n\\u00a0\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ch3\u003eHotfix\u003c/h3\u003e\u003cp\u003eThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above):\u003c/p\u003e\u003cul\u003e\u003cli\u003eMOS-0.39.3 and below releases in the MOS-0.39.x train\u003c/li\u003e\u003cli\u003eMOS-0.38.1 and below releases in the MOS-0.38.x train\u003c/li\u003e\u003cli\u003eMOS-0.37.1 and below releases in the MOS-0.37.x train\u003c/li\u003e\u003cli\u003eMOS-0.36.9 and below releases in the MOS-0.36.x train\u003c/li\u003e\u003cli\u003eMOS-0.35.3 and below releases in the MOS-0.35.x train\u003c/li\u003e\u003cli\u003eMOS-0.34.0 in the MOS-0.34.x train\u003c/li\u003e\u003c/ul\u003e\u003cp\u003ePlease note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used.\u003c/p\u003e\u003cpre\u003eVersion: 1.0\\nURL: \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm\\\"\u003ehotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm\u003c/a\u003e\\nSWIX hash:(SHA512)\\n168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997\\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2023-12-05T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"No mitigation exists.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eNo mitigation exists.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\\u2019s running config. \\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cb\u003e\u003cspan style=\\\"background-color: transparent;\\\"\u003eOn affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device\\u2019s running config. \u003c/span\u003e\u003c/b\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"cwe-212\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"In order to be vulnerable to CVE-2023-24547 the following condition must be met:\\n\\nA BGP password must be configured and be in plain text. An example of this is shown below:\\n\\nswitch\u003eshow running-config bgp\\nrouter bgp 65000\\n\\u00a0 \\u00a0neighbor 192.0.2.1 remote-as 66000\\n\\u00a0 \\u00a0neighbor 192.0.2.1 password pA$$w0rd\\n\\n\\nIf a BGP password is not configured there is no exposure to this issue.\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIn order to be vulnerable to CVE-2023-24547 the following condition must be met:\u003c/p\u003e\u003cp\u003eA BGP password must be configured and be in plain text. An example of this is shown below:\u003c/p\u003e\u003cpre\u003eswitch\u0026gt;show running-config bgp\\nrouter bgp 65000\\n\u0026nbsp; \u0026nbsp;neighbor 192.0.2.1 remote-as 66000\\n\u0026nbsp; \u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 0);\\\"\u003eneighbor 192.0.2.1 password pA$$w0rd\u003c/span\u003e\\n\u003c/pre\u003e\u003cp\u003eIf a BGP password is not configured there is no exposure to this issue.\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7\", \"shortName\": \"Arista\", \"dateUpdated\": \"2023-12-05T23:29:01.375Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-24547\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-28T15:54:35.342Z\", \"dateReserved\": \"2023-01-26T11:37:43.827Z\", \"assignerOrgId\": \"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7\", \"datePublished\": \"2023-12-05T23:29:01.375Z\", \"assignerShortName\": \"Arista\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…