| CVE-2025-7048 | On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o | Arista Networks | EOS | Medium | 4.3 | 2026-01-06 19:15:44 | Deep Dive |
| CVE-2025-8872 | A specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted | Arista Networks | EOS | Medium | 6.5 | 2025-12-16 19:32:21 | Deep Dive |
| CVE-2025-8870 | On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device. | Arista Networks | EOS | Medium | 4.9 | 2025-11-14 15:57:05 | Deep Dive |
| CVE-2025-54549 | Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO | Arista Networks | DANZ Monitoring Fabric | Medium | 5.9 | 2025-10-29 22:55:54 | Deep Dive |
| CVE-2025-54548 | On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes) | Arista Networks | DANZ Monitoring Fabric | Medium | 4.3 | 2025-10-29 22:52:54 | Deep Dive |
| CVE-2025-54547 | On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired | Arista Networks | DANZ Monitoring Fabric | Medium | 5.3 | 2025-10-29 22:45:53 | Deep Dive |
| CVE-2025-54546 | On affected platforms, restricted users could use SSH port forwarding to access host-internal services | Arista Networks | DANZ Monitoring Fabric | High | 7.5 | 2025-10-29 22:40:58 | Deep Dive |
| CVE-2025-54545 | On affected platforms, a restricted user could break out of the CLI sandbox to the system shell and elevate their privileges. | Arista Networks | DANZ Monitoring Fabric | High | 7.8 | 2025-10-29 22:36:24 | Deep Dive |
| CVE-2025-6978 | Diagnostics command injection vulnerability | Arista Networks | Arista Edge Threat Management - Arista Next Generation Firewall | High | 7.2 | 2025-10-23 18:50:15 | Deep Dive |
| CVE-2025-6979 | Captive Portal can allow authentication bypass | Arista Networks | Arista Edge Threat Management - Arista Next Generation Firewall | High | 8.8 | 2025-10-23 18:46:38 | Deep Dive |
| CVE-2025-6980 | Captive Portal can expose sensitive information | Arista Networks | Arista Edge Threat Management - Arista Next Generation Firewall | High | 7.5 | 2025-10-23 18:41:47 | Deep Dive |
| CVE-2025-6188 | On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do n | Arista Networks | EOS | High | 7.5 | 2025-08-25 20:14:23 | Deep Dive |
| CVE-2025-3456 | On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-c | Arista Networks | EOS | Low | 3.8 | 2025-08-25 20:02:49 | Deep Dive |
| CVE-2025-2826 | n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one or more ethernet or LAG interfaces may result in ACL policies not being enforced for ingress packets. | Arista Networks | EOS | Low | 2.6 | 2025-05-27 22:22:52 | Deep Dive |
| CVE-2025-2796 | On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal | Arista Networks | EOS | Medium | 5.3 | 2025-05-27 22:16:53 | Deep Dive |
| CVE-2024-11185 | On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be improperly forwarded to ports associated with different VLANs, resulting in a breach of VLAN isolation and segmentation boundaries. | Arista Networks | EOS | Medium | 6.5 | 2025-05-27 22:11:30 | Deep Dive |
| CVE-2024-9448 | On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropp | Arista Networks | EOS | High | 7.5 | 2025-05-08 19:14:00 | Deep Dive |
| CVE-2024-12378 | On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent over the secure Vxlan tunnels in the clear. | Arista Networks | CloudVision Portal | Critical | 9.1 | 2025-05-08 19:05:22 | Deep Dive |
| CVE-2024-11186 | On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-prem | Arista Networks | CloudVision Portal | Critical | 10.0 | 2025-05-08 18:47:53 | Deep Dive |
| CVE-2025-0505 | On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state | Arista Networks | CloudVision Portal | Critical | 10.0 | 2025-05-08 18:37:14 | Deep Dive |