GSD-2023-6068

Vulnerability from gsd - Updated: 2023-12-13 01:20
Details
On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some
Aliases
Aliases

{
  "GSD": {
    "alias": "CVE-2023-6068",
    "id": "GSD-2023-6068"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-6068"
      ],
      "details": "On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL\u2019s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some",
      "id": "GSD-2023-6068",
      "modified": "2023-12-13T01:20:32.981459Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "psirt@arista.com",
        "ID": "CVE-2023-6068",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "MOS",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "1.7.1"
                        },
                        {
                          "version_affected": "=",
                          "version_value": "1.6"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Arista Networks"
            }
          ]
        }
      },
      "configuration": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eIn order to be vulnerable to CVE-2023-6068, the following condition must be met:\u003c/p\u003e\u003cp\u003eMOS must be configured with MultiAccess FPGA software versions 1.7.1 or 1.6.x and can be determined by running the show version command and referring to the highlighted section as shown below.\u003c/p\u003e\u003cpre\u003eswitch(config)#show version\nDevice: Metamako MetaMux 48 with L-Series\nSKU: DCS-7130-48LB\nSerial number: M48LB-A3-27719-4\n   \nSoftware image version: 0.39.0alpha4\nInternal build ID: master+9345\n\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003eApplications: multiaccess-1.7.1\u003c/span\u003e\u003c/pre\u003e\u003cbr\u003e"
            }
          ],
          "value": "In order to be vulnerable to CVE-2023-6068, the following condition must be met:\n\nMOS must be configured with MultiAccess FPGA software versions 1.7.1 or 1.6.x and can be determined by running the show version command and referring to the highlighted section as shown below.\n\nswitch(config)#show version\nDevice: Metamako MetaMux 48 with L-Series\nSKU: DCS-7130-48LB\nSerial number: M48LB-A3-27719-4\n   \nSoftware image version: 0.39.0alpha4\nInternal build ID: master+9345\nApplications: multiaccess-1.7.1\n\n\n"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL\u2019s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some"
          }
        ]
      },
      "exploit": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue was discovered internally and Arista is not aware of any malicious uses of this issue in customer networks.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "This issue was discovered internally and Arista is not aware of any malicious uses of this issue in customer networks.\n"
        }
      ],
      "generator": {
        "engine": "Vulnogram 0.1.0-dev"
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-283",
                "lang": "eng",
                "value": "CWE-283"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091",
            "refsource": "MISC",
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091"
          }
        ]
      },
      "solution": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\u003c/p\u003e\u003cp\u003eCVE-2023-6068 has been fixed in the following releases:\u003c/p\u003e\u003cul\u003e\u003cli\u003eMultiAccess FPGA 1.8.0 and later\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e"
            }
          ],
          "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\n\nCVE-2023-6068 has been fixed in the following releases:\n\n  *  MultiAccess FPGA 1.8.0 and later\n\n\n\n"
        }
      ],
      "source": {
        "defect": [
          "BUG 869667"
        ],
        "discovery": "INTERNAL"
      },
      "work_around": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe workaround is to only apply one access-list to any particular port after the MultiAccess image is loaded into the FPGA. If a new access-list is to be applied to a port, the FPGA image should be reloaded after the access-list is applied.\u003c/p\u003e\u003cp\u003eRun the following commands to reload the FPGA image, where the line in yellow represents new access control lists to be added:\u003c/p\u003e\u003cpre\u003eswitch(config-app-multiaccess)#shut\nswitch(config-app-multiaccess)\u003cspan style=\"background-color: rgb(255, 255, 0);\"\u003e#multiaccess-group 0 client 0 access-list new_acl_if_need\u003c/span\u003e\nswitch(config-app-multiaccess)#no shut\n\u003c/pre\u003e\u003cp\u003eThe previous applied access control lists will automatically apply after FPGA reload.\u003c/p\u003e\u003cbr\u003e"
            }
          ],
          "value": "The workaround is to only apply one access-list to any particular port after the MultiAccess image is loaded into the FPGA. If a new access-list is to be applied to a port, the FPGA image should be reloaded after the access-list is applied.\n\nRun the following commands to reload the FPGA image, where the line in yellow represents new access control lists to be added:\n\nswitch(config-app-multiaccess)#shut\nswitch(config-app-multiaccess)#multiaccess-group 0 client 0 access-list new_acl_if_need\nswitch(config-app-multiaccess)#no shut\n\n\nThe previous applied access control lists will automatically apply after FPGA reload.\n\n\n"
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "descriptions": [
          {
            "lang": "en",
            "value": "On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL\u2019s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some"
          }
        ],
        "id": "CVE-2023-6068",
        "lastModified": "2024-03-05T13:41:01.900",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "HIGH",
                "attackVector": "NETWORK",
                "availabilityImpact": "NONE",
                "baseScore": 3.1,
                "baseSeverity": "LOW",
                "confidentialityImpact": "NONE",
                "integrityImpact": "LOW",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 1.6,
              "impactScore": 1.4,
              "source": "psirt@arista.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2024-03-04T20:15:50.267",
        "references": [
          {
            "source": "psirt@arista.com",
            "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19023-security-advisory-0091"
          }
        ],
        "sourceIdentifier": "psirt@arista.com",
        "vulnStatus": "Awaiting Analysis",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-283"
              }
            ],
            "source": "psirt@arista.com",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…