CVE-2023-3646

Public Exploit
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.

Description

On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.

Remediation

Solution:

  • The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2023-3646 has been fixed in the following releases: * 4.28.6M and later releases in the 4.28.x train * 4.29.2F and later releases in the 4.29.x train
  • HotfixThe following hotfix can be applied to remediate CVE-2023-3646. The hotfix only applies to the releases listed below and no other releases. All other versions require upgrading to a release containing the fix (as listed above): * 4.28.2F through 4.28.5.1M releases in the 4.28.x train * 4.29.1F and earlier releases in the 4.29.X train Note: Installing/uninstalling the Hotfix will result in a restart of the SandFapNi agent and an associated reprogramming of the switch chip. This process could result in outages from 5-20 minutes, depending on the number of active ports in the particular system. To determine which hotfix to use, run “show version” from the CLI and refer to the “Architecture” Field. Version: 1.0 URL: SecurityAdvisory88_CVE-2023-3646_Hotfix_i686.swix https://www.arista.com/support/advisories-notices/sa-download/ SWIX hash:(SHA-512) 9c01d1bc1d657879e1a1b657a8c0dab090d589efc3f2c64e9cac1ae0356fce14496809893bffb0892b1505f8b4ee25cad0064bd7315ba6737dc5fdb200539f1a   URL: SecurityAdvisory88_CVE-2023-3646_Hotfix_x86_64.swix https://www.arista.com/support/advisories-notices/sa-download/ SWIX hash:(SHA512) 98e98c2c34f81df4da3e4068ac9a81191f4c6ef1acab884972d092c79a7495e00d9a25c8713620d3e25b4699f777810a627634eb8078dcbbb19317ed27a9b0d5   For instructions on installation and verification of the hotfix patch, refer to the “managing eos extensions” https://www.arista.com/en/um-eos/eos-managing-eos-extensions  section in the EOS User Manual. Ensure that the patch is made persistent across reboots by running the command ‘copy installed-extensions boot-extensions’.

Workaround:

  • The suggestion to prevent this issue is to remove any mirroring config #show monitor session No sessions created This example confirms that the system does not have any mirroring config present which will prevent this issue from occurring.

Category

5.9
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.15%
Vendor Advisory arista.com
Affected: Arista Networks EOS
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-3646?
CVE-2023-3646 has been scored as a medium severity vulnerability.
How to fix CVE-2023-3646?
To fix CVE-2023-3646: The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2023-3646 has been fixed in the following releases: * 4.28.6M and later releases in the 4.28.x train * 4.29.2F and later releases in the 4.29.x train
Is CVE-2023-3646 being actively exploited in the wild?
It is possible that CVE-2023-3646 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-3646?
CVE-2023-3646 affects Arista Networks EOS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.