Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Arista Networks — Vulnerabilities & Security Advisories 64

Browse all 64 CVE security advisories affecting Arista Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2024-47517 Expired and unusable administrator authentication tokens can be revealed by units that have timed out from ETM access — Arista Edge Threat ManagementCWE-1230 6.8 Medium2025-01-10
CVE-2024-9134 Multiple SQL Injection vulnerabilities exist in the reporting application. A user with advanced report application access rights can exploit the SQL injection, allowing them to execute commands on the underlying operating system with elevated privileges. — Arista Edge Threat ManagementCWE-89 8.3 High2025-01-10
CVE-2024-9133 A user with administrator privileges is able to retrieve authentication tokens — Arista Edge Threat ManagementCWE-287 6.6 Medium2025-01-10
CVE-2024-9132 The administrator is able to configure an insecure captive portal script — Arista Edge Threat ManagementCWE-94 8.1 High2025-01-10
CVE-2024-9131 A user with administrator privileges can perform command injection — Arista Edge Threat ManagementCWE-88 7.2 High2025-01-10
CVE-2024-7142 On Arista CloudVision Appliance (CVA) affected releases running on appliances that support hardware disk encryption (DCA-350E-CV only), the disk encryption might not be successfully performed. This results in the disks remaining unsecured and data on them — CloudVision ApplianceCWE-311 4.6 Medium2025-01-10
CVE-2024-5872 On affected platforms running Arista EOS, a specially crafted packet with incorrect VLAN tag might be copied to CPU, which may cause incorrect control plane behavior related to the packet, such as route flaps, multicast routes learnt, etc. — EOS 6.5 Medium2025-01-10
CVE-2024-7095 On affected platforms running Arista EOS with SNMP configured, if “snmp-server transmit max-size” is configured, under some circumstances a specially crafted packet can cause the snmpd process to leak memory. This may result in the snmpd process being term — EOS 4.3 Medium2025-01-10
CVE-2024-6437 On affected platforms running Arista EOS with one of the following features configured to redirect IP traffic to a next hop: policy-based routing (PBR), BGP Flowspec, or interface traffic policy -- certain IP traffic such as IPv4 packets with IP options ma — EOS-Policy Based Routing (PBR) 5.8 Medium2025-01-10
CVE-2024-4578 Privilege escalation in Arista Wireless Access Points — Arista Wireless Access PointsCWE-77 8.4 High2024-06-27
CVE-2023-6068 On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some — MOSCWE-283 3.1 Low2024-03-04
CVE-2024-27889 Multiple SQL Injection vulnerabilities exist in the reporting application of the Arista Edge Threat Management - Arista NG Firewall (NGFW). — Arista Edge Threat Management - Arista NG Firewall (NGFW)CWE-89 8.8 High2024-03-04
CVE-2023-24547 On Arista MOS configuration of a BGP password will cause the password to be logged in clear text. — MOS 5.9 Medium2023-12-05
CVE-2023-3646 On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload. — EOSCWE-125 5.9 Medium2023-08-29
CVE-2023-24548 On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets — EOSCWE-120 5.3 Medium2023-08-29
CVE-2023-24510 On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart. — Arista EOSCWE-755 7.5 High2023-06-05
CVE-2023-24512 On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. — TerminattrCWE-284 8.8 High2023-04-25
CVE-2023-24509 On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading t ... — Arista EOSCWE-269 9.3 Critical2023-04-13
CVE-2023-24513 On affected platforms running Arista CloudEOS a size check bypass issue in the Software Forwarding Engine (Sfe) may allow buffer over reads in later code. Additionally, depending on configured options this may cause a recomputation of the TCP checksum ... — EOSCWE-126 6.5 Medium2023-04-12
CVE-2023-24511 On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. — EOSCWE-401 5.3 Medium2023-04-12
CVE-2023-24545 On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. — EOSCWE-400 7.5 High2023-04-12
CVE-2021-28510 For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable. — EOSCWE-400 5.3 Medium2023-01-24
CVE-2021-28511 This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches t ... — EOSCWE-284 5.8 Medium2022-08-05
CVE-2022-29071 This advisory documents an internally found vulnerability in the on premises deployment model of Arista CloudVision Portal (CVP) where under a certain set of conditions, user passwords can be leaked in the Audit and System logs. The impact of this vu ... — CloudVision PortalCWE-200 4.0 Medium2022-08-05
CVE-2021-28509 TerminAttr streams MACsec sensitive data in clear text to other authorized users in CVP — Arista EOSCWE-255 6.1 Medium2022-05-26
CVE-2021-28508 TerminAttr streams IPsec sensitive data in clear text to other authorized users in CVP — Arista EOSCWE-255 6.8 Medium2022-05-26
CVE-2021-28505 On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol. — EOSCWE-284 7.5 High2022-04-14
CVE-2021-28504 On Arista Strata family products which have “TCAM profile” feature enabled when Port IPv4 access-list has a rule which matches on “vxlan” as protocol then that rule and subsequent rules ( rules declared after it in ACL ) do not match on IP protocol fi ... — EOSCWE-284 7.5 High2022-04-01
CVE-2021-28503 In Arista's EOS software affected releases, eAPI might skip re-evaluating user credentials when certificate based authentication is used, which allows remote attackers to access the device via eAPI. — Arista EOSCWE-305 7.4 High2022-02-04
CVE-2021-28500 An issue has recently been discovered in Arista EOS where the incorrect use of EOS's AAA API’s by the OpenConfig and TerminAttr agents could result in unrestricted access to the device for local users with nopassword configuration. — Arista EOSCWE-285 9.1 Critical2022-01-14

This page lists every published CVE security advisory associated with Arista Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.