Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Vulnerability List
Found 75 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2025-7048 On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o Arista NetworksEOS Medium 4.3 2026-01-06 19:15:44 Deep Dive
CVE-2025-8872 A specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted Arista NetworksEOS Medium 6.5 2025-12-16 19:32:21 Deep Dive
CVE-2025-8870 On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device. Arista NetworksEOS Medium 4.9 2025-11-14 15:57:05 Deep Dive
CVE-2025-54549 Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO Arista NetworksDANZ Monitoring Fabric Medium 5.9 2025-10-29 22:55:54 Deep Dive
CVE-2025-54548 On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes) Arista NetworksDANZ Monitoring Fabric Medium 4.3 2025-10-29 22:52:54 Deep Dive
CVE-2025-54547 On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired Arista NetworksDANZ Monitoring Fabric Medium 5.3 2025-10-29 22:45:53 Deep Dive
CVE-2025-54546 On affected platforms, restricted users could use SSH port forwarding to access host-internal services Arista NetworksDANZ Monitoring Fabric High 7.5 2025-10-29 22:40:58 Deep Dive
CVE-2025-54545 On affected platforms, a restricted user could break out of the CLI sandbox to the system shell and elevate their privileges. Arista NetworksDANZ Monitoring Fabric High 7.8 2025-10-29 22:36:24 Deep Dive
CVE-2025-6978 Diagnostics command injection vulnerability Arista NetworksArista Edge Threat Management - Arista Next Generation Firewall High 7.2 2025-10-23 18:50:15 Deep Dive
CVE-2025-6979 Captive Portal can allow authentication bypass Arista NetworksArista Edge Threat Management - Arista Next Generation Firewall High 8.8 2025-10-23 18:46:38 Deep Dive
CVE-2025-6980 Captive Portal can expose sensitive information Arista NetworksArista Edge Threat Management - Arista Next Generation Firewall High 7.5 2025-10-23 18:41:47 Deep Dive
CVE-2025-6188 On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do n Arista NetworksEOS High 7.5 2025-08-25 20:14:23 Deep Dive
CVE-2025-3456 On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-c Arista NetworksEOS Low 3.8 2025-08-25 20:02:49 Deep Dive
CVE-2025-2826 n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one or more ethernet or LAG interfaces may result in ACL policies not being enforced for ingress packets. Arista NetworksEOS Low 2.6 2025-05-27 22:22:52 Deep Dive
CVE-2025-2796 On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal Arista NetworksEOS Medium 5.3 2025-05-27 22:16:53 Deep Dive
CVE-2024-11185 On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be improperly forwarded to ports associated with different VLANs, resulting in a breach of VLAN isolation and segmentation boundaries. Arista NetworksEOS Medium 6.5 2025-05-27 22:11:30 Deep Dive
CVE-2024-9448 On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropp Arista NetworksEOS High 7.5 2025-05-08 19:14:00 Deep Dive
CVE-2024-12378 On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent over the secure Vxlan tunnels in the clear. Arista NetworksCloudVision Portal Critical 9.1 2025-05-08 19:05:22 Deep Dive
CVE-2024-11186 On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-prem Arista NetworksCloudVision Portal Critical 10.0 2025-05-08 18:47:53 Deep Dive
CVE-2025-0505 On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state Arista NetworksCloudVision Portal Critical 10.0 2025-05-08 18:37:14 Deep Dive