On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.

Project Subscriptions

Vendors Products
7010t-48 Subscribe
7010tx-48 Subscribe
7010tx-48-dc Subscribe
7020sr-24c2 Subscribe
7020sr-32c2 Subscribe
7020tr-48 Subscribe
7020tra-48 Subscribe
7050cx3-32s Subscribe
7050cx3m-32s Subscribe
7050qx-32s Subscribe
7050qx2-32s Subscribe
7050sx-128 Subscribe
7050sx-64 Subscribe
7050sx-72q Subscribe
7050sx2-128 Subscribe
7050sx2-72q Subscribe
7050sx3-48c8 Subscribe
7050sx3-48yc Subscribe
7050sx3-48yc12 Subscribe
7050sx3-48yc8 Subscribe
7050sx3-96yc8 Subscribe
7050tx-48 Subscribe
7050tx-64 Subscribe
7050tx-72q Subscribe
7050tx2-128 Subscribe
7050tx3-48c8 Subscribe
7060cx-32s Subscribe
7060cx2-32s Subscribe
7060dx4-32 Subscribe
7060px4-32 Subscribe
7060sx2-48yc6 Subscribe
7130-16g3s Subscribe
7130-48g3s Subscribe
7130-96s Subscribe
7150s-24 Subscribe
7150s-52 Subscribe
7150s-64 Subscribe
7150sc-24 Subscribe
7150sc-64 Subscribe
7160-32cq Subscribe
7160-48tc6 Subscribe
7160-48yc6 Subscribe
7170-32c Subscribe
7170-32cd Subscribe
7170-64c Subscribe
7170b-64c Subscribe
720df-48y Subscribe
720dp-24s Subscribe
720dp-48s Subscribe
720dt-24s Subscribe
720dt-48s Subscribe
720dt-48y Subscribe
720xp-24y6 Subscribe
720xp-24zy4 Subscribe
720xp-48y6 Subscribe
720xp-48zc2 Subscribe
720xp-96zc2 Subscribe
722xpm-48y4 Subscribe
722xpm-48zy8 Subscribe
7250qx-64 Subscribe
7260cx3 Subscribe
7260cx3-64 Subscribe
7260qx-64 Subscribe
7260sx2 Subscribe
7300x-32q Subscribe
7300x-64s Subscribe
7300x-64t Subscribe
7300x3-32c Subscribe
7300x3-48yc4 Subscribe
7320x-32c Subscribe
7500r3-24d Subscribe
7500r3-24p Subscribe
7500r3-36cq Subscribe
7500r3k-36cq Subscribe
7800r3-36p Subscribe
7800r3-48cq Subscribe
7800r3k-48cq Subscribe
Cloudeos Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-28528 On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
Fixes

Solution

CVE-2023-24510 has been fixed in the following releases: - 4.29.2F and later releases in the 4.29.x train - 4.28.7M and later releases in the 4.28.x train - 4.27.10M and later releases in the 4.27.x train - 4.26.10M and later releases in the 4.26.x train


Workaround

The hotfix https://www.arista.com/support/advisories-notices/sa-download?sa=87-SecurityAdvisory87_Hotfix.swix can be used to remediate CVE-2023-24510. The hotfix only applies to the releases listed below and no other releases: - 4.29.1F and below releases in the 4.29.x train - 4.28.6.1M and below releases in the 4.28.x train - 4.27.9M and below releases in the 4.27.x train - 4.26.9M and below releases in the 4.26.x train - 4.25.10M and below releases in the 4.25.x train

History

Wed, 08 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-01-08T17:46:55.549Z

Reserved: 2023-01-24T00:00:00

Link: CVE-2023-24510

cve-icon Vulnrichment

Updated: 2024-08-02T10:56:04.426Z

cve-icon NVD

Status : Modified

Published: 2023-06-05T22:15:11.717

Modified: 2024-11-21T07:48:01.133

Link: CVE-2023-24510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses