Revision | Date | Changes |
---|---|---|
1.0 | December 16th, 2020 | Initial Release |
The CVE-ID tracking this issue is: CVE-2020-24360
CVSSv3.1 Base Score: 7.4/10 (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
This advisory documents the impact of a vulnerability in Arista’s EOS affecting the 7800R3, 7500R3 series and the 7280R3 series of products. Affected software releases are listed below. An issue with ARP packets may result in issues that cause a kernel crash, followed by a device reload. Bug 504140 tracks this issue for EOS.
This is an internally found vulnerability and Arista has not received any report of this issue being used in any malicious manner.
Affected Software
EOS Versions
Affected Platforms
This vulnerability affects only the following platforms:
The following products are not affected:
Platforms from the Arista R3 series running the affected software with both ‘ip routing’ enabled and Layer 3 interfaces configured, either as a routed port or as an SVI, are vulnerable. The recommendation is to install the hotfix or upgrade to a remediated EOS version. Below are show commands that can help determine if the required configurations are in use. The commands listed below can be used to identify the presence of Layer 3 interfaces and ip routing configuration (relevant outputs highlighted in red). In the example below, Ethernet1 is a routed port and Vlan4000 is an SVI - both are Layer 3 interfaces.
switch#show ip interfaces brief
Interface IP Address Status Protocol MTU
------------- ---------------- ------------ ----------- ------
Ethernet1 172.15.100.109/30 up up 1500
Ethernet2 172.15.100.113/30 up up 1500
Loopback0 172.15.0.21/32 up up 65535
Management1 10.90.165.21/24 up up 1500
Vlan4000 192.168.1.2/30 up up 1500
switch#show run section ip routing
ip routing
As a result of the kernel panic, the following (highlighted) function name is displayed in the ‘Debugging Information’ section in the output of command ‘show reload cause’:
"fab_send_frame_up.constprop.11+0x951/0x193e"
If an EOS upgrade to the remediated version is not feasible, a hotfix is available as mitigation against this vulnerability.
The hotfix can be installed as an EOS extension and is applicable across all affected EOS versions. Installing the hotfix is non-disruptive to control plane and data plane traffic.
For instructions on installation and verification of EOS extensions, refer to this section in the EOS User Manual: https://www.arista.com/en/um-eos/eos-section-6-6-managing-eos-extensions. Ensure that the extension is made persistent across reboots by running the command ‘copy installed-extensions boot-extensions’.
This vulnerability is tracked by Bug 504140. The recommended resolution is to upgrade to a remediated EOS version.
The vulnerability has been fixed in the following EOS versions:
If you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:
By email: This email address is being protected from spambots. You need JavaScript enabled to view it.
By telephone: 408-547-5502
866-476-0000