6.5
CVE-2025-0936
- EPSS 0.03%
- Published 07.05.2025 22:52:25
- Last modified 08.05.2025 14:39:09
- Source psirt@arista.com
- Teams watchlist Login
- Open Login
On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly on other remote accounting servers (i.e. TACACS, RADIUS, etc).
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorArista Networks
≫
Product
EOS
Default Statusunaffected
Version <=
4.33.1
Version
4.33.0
Status
affected
Version <=
4.32.3M
Version
4.32.0
Status
affected
Version <=
4.31.5M
Version
4.31.0
Status
affected
Version <=
4.30.9M
Version
4.30.1F
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.075 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@arista.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
|
CWE-256 Plaintext Storage of a Password
Storing a password in plaintext may result in a system compromise.