CVE-2023-24547

On Arista MOS configuration of a BGP password will cause the password to be logged in clear text.

Description

On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config.

Remediation

Solution:

  • The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the MOS User Guide: Updating https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf CVE-2023-24547 has been fixed in the following releases: * MOS-0.36.10 and later releases in the MOS-0.36.x train * MOS-0.39.4 and later releases in the MOS-0.39.x train Because this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below: switch>show running-config bgp router bgp 65000    neighbor 192.0.2.1 remote-as 66000    neighbor 192.0.2.1 password key 7 00143242404C5B140B
  • HotfixThe following hotfix can be applied to remediate CVE-2023-24547. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above): * MOS-0.39.3 and below releases in the MOS-0.39.x train * MOS-0.38.1 and below releases in the MOS-0.38.x train * MOS-0.37.1 and below releases in the MOS-0.37.x train * MOS-0.36.9 and below releases in the MOS-0.36.x train * MOS-0.35.3 and below releases in the MOS-0.35.x train * MOS-0.34.0 in the MOS-0.34.x train Please note that the only MOS release trains currently under maintenance support are MOS-0.39.x and MOS-0.36.x. The hotfix working for other releases should not be treated as evidence that these releases continue to be supported. For security it is important to ensure supported releases are used. Version: 1.0 URL: hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm https://artifacts.metamako.com/artifactory/releases/hotfix/4.0.0/hotfix-cve-2023-24547-4.0.0-1.14.core2_64.rpm SWIX hash:(SHA512) 168b2ee3deb8d4a3151b9c24936ff9d6523557b366ceffc98e57e8bf80638997  

Workaround:

  • No mitigation exists.

Category

5.9
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.02%
Vendor Advisory arista.com
Affected: Arista Networks MOS
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-24547?
CVE-2023-24547 has been scored as a medium severity vulnerability.
How to fix CVE-2023-24547?
To fix CVE-2023-24547: The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see the MOS User Guide: Updating https://mako.arista.com/dyn/softwareportal/artefact/3688/mos-0.39.1-userguide.pdf CVE-2023-24547 has been fixed in the following releases: * MOS-0.36.10 and later releases in the MOS-0.36.x train * MOS-0.39.4 and later releases in the MOS-0.39.x train Because this issue would cause the password to be saved in logs and remote AAA servers it is recommended to also rotate the BGP password, if possible. Upon upgrading to a new release, the BGP password will be obfuscated with the type-7 algorithm as shown below: switch>show running-config bgp router bgp 65000    neighbor 192.0.2.1 remote-as 66000    neighbor 192.0.2.1 password key 7 00143242404C5B140B
Is CVE-2023-24547 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-24547 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-24547?
CVE-2023-24547 affects Arista Networks MOS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.