Date:December 16th, 2020

Version: 1.0

Revision Date Changes
1.0 December 16th, 2020 Initial Release
 
 

The CVE-ID tracking this issue is: CVE-2020-24360
CVSSv3.1 Base Score: 7.4/10 (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)

Description

This advisory documents the impact of a vulnerability in Arista's EOS affecting the 7800R3, 7500R3 series and the 7280R3 series of products. Affected software releases are listed below. An issue with ARP packets may result in issues that cause a kernel crash, followed by a device reload. Bug 504140 tracks this issue for EOS.

This is an internally found vulnerability and Arista has not received any report of this issue being used in any malicious manner.

Vulnerability Assessment

Affected Software

EOS Versions

  • 4.24.2.4F and below releases in the 4.24.x train.
  • 4.23.4M and below releases in the 4.23.x train.
  • 4.22.6M and below releases in the 4.22.x train

Affected Platforms

This vulnerability affects only the following platforms:

  • 7500R3 Series
  • 7800R3 Series
  • 7280R3 Series

The following products are not affected:

  • Arista EOS-based products:
    • 7010 series
    • 7020R Series
    • 7050X/X2/X3 series
    • 7060X/X2/X4 series
    • 7150 series
    • 7160 series
    • 7170 series
    • 720XP series
    • 750X series
    • 7250X series
    • 7260X/X3 series
    • 7280E/R/R2 series
    • 7300X/X3 series
    • 7320X series
    • 7368 / X4 series
    • 7500E/R/R2 series
  • Arista Wireless Access Points
  • CloudVision Wi-Fi, virtual appliance or physical appliance
  • CloudVision Wi-Fi cloud service delivery
  • CloudVision Portal, virtual appliance or physical appliance
  • CloudVision as-a-Service
  • Arista 7130 Systems running MOS
  • Arista Converged Cloud Fabric and DANZ Monitoring Fabric (Formerly Big Switch Nodes for BCF and BMF)

Symptoms

Platforms from the Arista R3 series running the affected software with both 'ip routing' enabled and Layer 3 interfaces configured, either as a routed port or as an SVI, are vulnerable. The recommendation is to install the hotfix or upgrade to a remediated EOS version. Below are show commands that can help determine if the required configurations are in use. The commands listed below can be used to identify the presence of Layer 3 interfaces and ip routing configuration (relevant outputs highlighted in red). In the example below, Ethernet1 is a routed port and Vlan4000 is an SVI - both are Layer 3 interfaces.

switch#show ip interfaces brief
                                                                                  
Interface      IP Address         Status       Protocol   MTU        
------------- ----------------  ------------ ----------- ------ 
Ethernet1      172.15.100.109/30    up           up       1500            
Ethernet2      172.15.100.113/30    up           up       1500            
Loopback0      172.15.0.21/32       up           up       65535            
Management1    10.90.165.21/24      up           up       1500            
Vlan4000       192.168.1.2/30       up           up       1500            

switch#show run section ip routing
ip routing

As a result of the kernel panic, the following (highlighted) function name is displayed in the 'Debugging Information' section in the output of command 'show reload cause':

"fab_send_frame_up.constprop.11+0x951/0x193e"

Mitigation

If an EOS upgrade to the remediated version is not feasible, a hotfix is available as mitigation against this vulnerability.

The hotfix can be installed as an EOS extension and is applicable across all affected EOS versions. Installing the hotfix is non-disruptive to control plane and data plane traffic.

For instructions on installation and verification of EOS extensions, refer to this section in the EOS User Manual: https://www.arista.com/en/um-eos/eos-section-6-6-managing-eos-extensions. Ensure that the extension is made persistent across reboots by running the command 'copy installed-extensions boot-extensions'.

  • Patch file download URL: SecurityAdvisory0059Hotfix.swix
  • Sha512sum: a33bc69f853269cfac2cf67c57033538100d5c356757ae0381614d10f537a2859db2d40bc29ff0eb37def08f12d15e4288293e25341c2a26453c562c4188730a

Resolution

This vulnerability is tracked by Bug 504140. The recommended resolution is to upgrade to a remediated EOS version.

The vulnerability has been fixed in the following EOS versions:

  • 4.25.0F
  • 4.24.3M
  • 4.23.5M
  • 4.22.7M

For More Information

If you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:

Open a Service Request:

By email: 该邮件地址已受到反垃圾邮件插件保护。要显示它需要在浏览器中启用 JavaScript。
By telephone: 408-547-5502
866-476-0000