On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-02-07T15:42:09.265Z

Reserved: 2023-01-24T00:00:00.000Z

Link: CVE-2023-24509

cve-icon Vulnrichment

Updated: 2024-08-02T10:56:04.282Z

cve-icon NVD

Status : Modified

Published: 2023-04-13T20:15:08.843

Modified: 2024-11-21T07:48:00.993

Link: CVE-2023-24509

cve-icon Redhat

No data.