Arista Networks EOS Mlag agent DOS (SA0032)

medium Nessus Plugin ID 133852

Synopsis

The version of Arista Networks EOS running on the remote device is affected by a denial of service vulnerability.

Description

The version of Arista Networks EOS running on the remote device is affected by a denial of service (DoS) vulnerability in the switch's Mlag agent. An unauthenticated, remote attacker can exploit this, by sending crafted UDP packets on a specific UDP port destined to the switch’s IP address, in order to cause the switch’s Mlag agent to restart.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Arista Networks EOS version 4.19.4M, 4.20.2F or later. Alternatively, apply the patch referenced in the vendor advisory.

See Also

http://www.nessus.org/u?dbecd1a4

Plugin Details

Severity: Medium

ID: 133852

File Name: arista_eos_sa0032.nasl

Version: 1.4

Type: combined

Family: Misc.

Published: 2/21/2020

Updated: 2/24/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2018-5255

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:arista:eos

Required KB Items: Host/Arista-EOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/1/2018

Vulnerability Publication Date: 3/1/2018

Reference Information

CVE: CVE-2018-5255