Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-7095", "assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "state": "PUBLISHED", "assignerShortName": "Arista", "dateReserved": "2024-07-24T22:07:44.124Z", "datePublished": "2025-01-10T20:19:10.234Z", "dateUpdated": "2025-01-14T14:33:54.850Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "EOS", "vendor": "Arista Networks", "versions": [{"lessThanOrEqual": "4.32.2F", "status": "affected", "version": "4.32.0F", "versionType": "custom"}, {"lessThanOrEqual": "4.31.4M", "status": "affected", "version": "4.31.0M", "versionType": "custom"}, {"lessThanOrEqual": "4.30.7M", "status": "affected", "version": "4.30.0M", "versionType": "custom"}, {"status": "affected", "version": "4.29.0", "versionType": "custom"}, {"status": "affected", "version": "4.28.0", "versionType": "custom"}, {"status": "affected", "version": "4.27.0", "versionType": "custom"}, {"status": "affected", "version": "4.26.0", "versionType": "custom"}, {"status": "affected", "version": "4.25.0", "versionType": "custom"}, {"status": "affected", "version": "4.24.0", "versionType": "custom"}, {"status": "affected", "version": "4.23.0", "versionType": "custom"}, {"status": "affected", "version": "4.22.0", "versionType": "custom"}]}], "configurations": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>In order to be vulnerable to CVE-2024-7095, the following conditions must be met:</p><ol><li>SNMP must be configured, and</li><li>\u201c<b>snmp-server transmit max-size</b>\u201d must be configured</li></ol><p>If the necessary configurations are present, <b>show snmp</b> output will look something like below, where <b>Transmit message maximum size</b> will contain a number smaller than the default of 65536:</p><pre>switch>show snmp\nChassis: None\n0 SNMP packets input\n 0 Bad SNMP version errors\n 0 Unknown community name\n 0 Illegal operation for community name supplied\n 0 Encoding errors\n 0 Number of requested variables\n 0 Number of altered variables\n 0 Get-request PDUs\n 0 Get-next PDUs\n 0 Set-request PDUs\n0 SNMP packets output\n 0 Too big errors\n 0 No such name errors\n 0 Bad value errors\n 0 General errors\n 0 Response PDUs\n 0 Trap PDUs\n 0 Trap drops\nAccess Control\n 0 Users\n 0 Groups\n 0 Views\nSNMP logging: disabled\n<span style=\"background-color: rgb(255, 255, 0);\">SNMP agent enabled in VRFs: default\nTransmit message maximum size: 1500</span>\n</pre><div> </div><p>If SNMP is not configured there is no exposure to this issue and the <b>show snmp</b> output will look something like:</p><pre>switch>show snmp\nChassis: XXXXXXXXXXX\nSNMP agent enabled in VRFs: default\nTransmit message maximum size: 65536\n<span style=\"background-color: rgb(255, 255, 0);\">SNMP agent disabled:</span> Either no communities and no users are configured, or no VRFs are configured.\n</pre><div> </div><p>If the <b>transmit max-size</b> is not configured there is no exposure to this issue and even if SNMP is configured, the <b>show snmp</b> output will look something like:</p><pre>switch>show snmp\nChassis: None\n0 SNMP packets input\n 0 Bad SNMP version errors\n 0 Unknown community name\n 0 Illegal operation for community name supplied\n 0 Encoding errors\n 0 Number of requested variables\n 0 Number of altered variables\n 0 Get-request PDUs\n 0 Get-next PDUs\n 0 Set-request PDUs\n0 SNMP packets output\n 0 Too big errors\n 0 No such name errors\n 0 Bad value errors\n 0 General errors\n 0 Response PDUs\n 0 Trap PDUs\n 0 Trap drops\nAccess Control\n 0 Users\n 0 Groups\n 0 Views\nSNMP logging: disabled\nSNMP agent enabled in VRFs: default\n<span style=\"background-color: rgb(255, 255, 0);\">Transmit message maximum size: 65536</span></pre><br>"}], "value": "In order to be vulnerable to CVE-2024-7095, the following conditions must be met:\n\n * SNMP must be configured, and\n * \u201csnmp-server transmit max-size\u201d must be configured\nIf the necessary configurations are present, show snmp\u00a0output will look something like below, where Transmit message maximum size\u00a0will contain a number smaller than the default of 65536:\n\nswitch>show snmp\nChassis: None\n0 SNMP packets input\n\u00a0 \u00a0 0 Bad SNMP version errors\n\u00a0 \u00a0 0 Unknown community name\n\u00a0 \u00a0 0 Illegal operation for community name supplied\n\u00a0 \u00a0 0 Encoding errors\n\u00a0 \u00a0 0 Number of requested variables\n\u00a0 \u00a0 0 Number of altered variables\n\u00a0 \u00a0 0 Get-request PDUs\n\u00a0 \u00a0 0 Get-next PDUs\n\u00a0 \u00a0 0 Set-request PDUs\n0 SNMP packets output\n\u00a0 \u00a0 0 Too big errors\n\u00a0 \u00a0 0 No such name errors\n\u00a0 \u00a0 0 Bad value errors\n\u00a0 \u00a0 0 General errors\n\u00a0 \u00a0 0 Response PDUs\n\u00a0 \u00a0 0 Trap PDUs\n\u00a0 \u00a0 0 Trap drops\nAccess Control\n\u00a0 \u00a0 0 Users\n\u00a0 \u00a0 0 Groups\n\u00a0 \u00a0 0 Views\nSNMP logging: disabled\nSNMP agent enabled in VRFs: default\nTransmit message maximum size: 1500\n\n\n\u00a0\n\nIf SNMP is not configured there is no exposure to this issue and the show snmp\u00a0output will look something like:\n\nswitch>show snmp\nChassis: XXXXXXXXXXX\nSNMP agent enabled in VRFs: default\nTransmit message maximum size: 65536\nSNMP agent disabled: Either no communities and no users are configured, or no VRFs are configured.\n\n\n\u00a0\n\nIf the transmit max-size\u00a0is not configured there is no exposure to this issue and even if SNMP is configured, the show snmp\u00a0output will look something like:\n\nswitch>show snmp\nChassis: None\n0 SNMP packets input\n\u00a0 \u00a0 0 Bad SNMP version errors\n\u00a0 \u00a0 0 Unknown community name\n\u00a0 \u00a0 0 Illegal operation for community name supplied\n\u00a0 \u00a0 0 Encoding errors\n\u00a0 \u00a0 0 Number of requested variables\n\u00a0 \u00a0 0 Number of altered variables\n\u00a0 \u00a0 0 Get-request PDUs\n\u00a0 \u00a0 0 Get-next PDUs\n\u00a0 \u00a0 0 Set-request PDUs\n0 SNMP packets output\n\u00a0 \u00a0 0 Too big errors\n\u00a0 \u00a0 0 No such name errors\n\u00a0 \u00a0 0 Bad value errors\n\u00a0 \u00a0 0 General errors\n\u00a0 \u00a0 0 Response PDUs\n\u00a0 \u00a0 0 Trap PDUs\n\u00a0 \u00a0 0 Trap drops\nAccess Control\n\u00a0 \u00a0 0 Users\n\u00a0 \u00a0 0 Groups\n\u00a0 \u00a0 0 Views\nSNMP logging: disabled\nSNMP agent enabled in VRFs: default\nTransmit message maximum size: 65536"}], "datePublic": "2024-11-19T20:08:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>On affected platforms running Arista EOS with SNMP configured, if \u201c<b>snmp-server transmit max-size</b>\u201d is configured, under some circumstances a specially crafted packet can cause the snmpd process to leak memory. This may result in the snmpd process being terminated (causing SNMP requests to time out until snmpd is restarted) and memory pressure for other processes on the switch. Increased memory pressure can cause processes other than snmpd to be at risk for unexpected termination as well.</p>"}], "value": "On affected platforms running Arista EOS with SNMP configured, if \u201csnmp-server transmit max-size\u201d is configured, under some circumstances a specially crafted packet can cause the snmpd process to leak memory. This may result in the snmpd process being terminated (causing SNMP requests to time out until snmpd is restarted) and memory pressure for other processes on the switch. Increased memory pressure can cause processes other than snmpd to be at risk for unexpected termination as well."}], "impacts": [{"descriptions": [{"lang": "en", "value": "capex-130"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"description": "cwe-401", "lang": "en"}]}], "providerMetadata": {"orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7", "shortName": "Arista", "dateUpdated": "2025-01-10T20:19:10.234Z"}, "references": [{"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/20650-security-advisory-0107"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\">EOS User Manual: Upgrades and Downgrades</a></p><div> </div><div>CVE-2024-7095 has been fixed in the following releases:</div><ul><li>4.32.3M and later releases in the 4.32.x train</li><li>4.31.5M and later releases in the 4.31.x train</li><li>4.30.8M and later releases in the 4.30.x train</li></ul><br>"}], "value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \n\n\u00a0\n\nCVE-2024-7095 has been fixed in the following releases:\n\n * 4.32.3M and later releases in the 4.32.x train\n * 4.31.5M and later releases in the 4.31.x train\n * 4.30.8M and later releases in the 4.30.x train"}], "source": {"advisory": "107", "defect": ["BUG974415"], "discovery": "INTERNAL"}, "title": "On affected platforms running Arista EOS with SNMP configured, if \u201csnmp-server transmit max-size\u201d is configured, under some circumstances a specially crafted packet can cause the snmpd process to leak memory. This may result in the snmpd process being term", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>The workaround is to disable <b>snmp-server transmit max-size</b> configuration:</p><pre>no snmp-server transmit max-size</pre><br>"}], "value": "The workaround is to disable snmp-server transmit max-size\u00a0configuration:\n\nno snmp-server transmit max-size"}], "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-401", "lang": "en", "description": "CWE-401 Missing Release of Memory after Effective Lifetime"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-01-14T14:31:59.560743Z", "id": "CVE-2024-7095", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-01-14T14:33:54.850Z"}}]}}