Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%

Arista Networks — Vulnerabilities & Security Advisories 64

Browse all 64 CVE security advisories affecting Arista Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPaused
CVE-2025-7048 On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o — EOSCWE-805 4.3 Medium2026-01-06
CVE-2025-8872 A specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted — EOSCWE-400 6.5 Medium2025-12-16
CVE-2025-8870 On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device. — EOSCWE-248 4.9 Medium2025-11-14
CVE-2025-54549 Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO — DANZ Monitoring FabricCWE-347 5.9 Medium2025-10-29
CVE-2025-54548 On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes) — DANZ Monitoring FabricCWE-200 4.3 Medium2025-10-29
CVE-2025-54547 On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired — DANZ Monitoring FabricCWE-613 5.3 Medium2025-10-29
CVE-2025-54546 On affected platforms, restricted users could use SSH port forwarding to access host-internal services — DANZ Monitoring FabricCWE-732 7.5 High2025-10-29
CVE-2025-54545 On affected platforms, a restricted user could break out of the CLI sandbox to the system shell and elevate their privileges. — DANZ Monitoring FabricCWE-732 7.8 High2025-10-29
CVE-2025-6978 Diagnostics command injection vulnerability — Arista Edge Threat Management - Arista Next Generation FirewallCWE-78 7.2 High2025-10-23
CVE-2025-6979 Captive Portal can allow authentication bypass — Arista Edge Threat Management - Arista Next Generation FirewallCWE-287 8.8 High2025-10-23
CVE-2025-6980 Captive Portal can expose sensitive information — Arista Edge Threat Management - Arista Next Generation FirewallCWE-200 7.5 High2025-10-23
CVE-2025-6188 On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do n — EOS 7.5 High2025-08-25
CVE-2025-3456 On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-c — EOSCWE-532 3.8 Low2025-08-25
CVE-2025-2826 n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one or more ethernet or LAG interfaces may result in ACL policies not being enforced for ingress packets. — EOSCWE-1284 2.6 Low2025-05-27
CVE-2025-2796 On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal — EOS 5.3 Medium2025-05-27
CVE-2024-11185 On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be improperly forwarded to ports associated with different VLANs, resulting in a breach of VLAN isolation and segmentation boundaries. — EOS 6.5 Medium2025-05-27
CVE-2024-9448 On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropp — EOSCWE-1284 7.5 High2025-05-08
CVE-2024-12378 On affected platforms running Arista EOS with secure Vxlan configured, restarting the Tunnelsec agent will result in packets being sent over the secure Vxlan tunnels in the clear. — CloudVision PortalCWE-319 9.1 Critical2025-05-08
CVE-2024-11186 On affected versions of the CloudVision Portal, improper access controls could enable a malicious authenticated user to take broader actions on managed EOS devices than intended. This advisory impacts the Arista CloudVision Portal products when run on-prem — CloudVision PortalCWE-287 10.0 Critical2025-05-08
CVE-2025-0505 On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state — CloudVision PortalCWE-269 10.0 Critical2025-05-08
CVE-2024-8100 On affected versions of the Arista CloudVision Portal (CVP on-prem), the time-bound device onboarding token can be used to gain admin privileges on CloudVision. — CloudVisionCWE-269 8.7 High2025-05-08
CVE-2025-0936 On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly — EOSCWE-256 6.5 Medium2025-05-07
CVE-2024-8000 On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restar — EOSCWE-1284 5.3 Medium2025-03-04
CVE-2024-9135 On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping. — EOSCWE-401 5.3 Medium2025-03-04
CVE-2025-1260 On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. — EOSCWE-284 9.1 Critical2025-03-04
CVE-2025-1259 On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. — EOSCWE-284 7.7 High2025-03-04
CVE-2024-9188 Specially constructed queries cause cross platform scripting leaking administrator tokens — Arista Edge Threat Management 8.8 High2025-01-10
CVE-2024-47520 A user with advanced report application access rights can perform actions for which they are not authorized — Arista Edge Threat ManagementCWE-653 7.6 High2025-01-10
CVE-2024-47519 Backup uploads to ETM subject to man-in-the-middle interception — Arista Edge Threat ManagementCWE-322 8.3 High2025-01-10
CVE-2024-47518 Specially constructed queries targeting ETM could discover active remote access sessions — Arista Edge Threat ManagementCWE-552 6.4 Medium2025-01-10

This page lists every published CVE security advisory associated with Arista Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.