CVE-2025-7048
- EPSS 0.01%
- Veröffentlicht 06.01.2026 19:15:44
- Zuletzt bearbeitet 08.01.2026 18:09:23
On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disrup...
CVE-2025-8872
- EPSS 0.03%
- Veröffentlicht 16.12.2025 19:32:20
- Zuletzt bearbeitet 18.12.2025 15:08:06
On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted. This may cause disruption in the OSFPv3 rout...
CVE-2025-8870
- EPSS 0.03%
- Veröffentlicht 14.11.2025 15:57:04
- Zuletzt bearbeitet 14.11.2025 16:42:03
On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153
CVE-2025-6188
- EPSS 0.05%
- Veröffentlicht 25.08.2025 20:14:23
- Zuletzt bearbeitet 27.08.2025 15:15:40
On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services tha...
CVE-2025-3456
- EPSS 0.01%
- Veröffentlicht 25.08.2025 20:02:48
- Zuletzt bearbeitet 25.08.2025 20:24:45
On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device run...
CVE-2025-2826
- EPSS 0.03%
- Veröffentlicht 27.05.2025 22:22:51
- Zuletzt bearbeitet 28.05.2025 15:01:30
n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one or more ethernet or LAG interfaces may result in ACL policies not being enforced for ingress pac...
CVE-2025-2796
- EPSS 0.03%
- Veröffentlicht 27.05.2025 22:16:53
- Zuletzt bearbeitet 28.05.2025 15:01:30
On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under ...
CVE-2024-11185
- EPSS 0.04%
- Veröffentlicht 27.05.2025 22:11:30
- Zuletzt bearbeitet 28.05.2025 15:01:30
On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be improperly forwarded to ports associated with different VLANs, resulting in a breach of VLAN isolation and segmentation boundaries.
CVE-2024-9448
- EPSS 0.09%
- Veröffentlicht 08.05.2025 19:14:00
- Zuletzt bearbeitet 12.05.2025 17:32:52
On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be...
CVE-2025-0936
- EPSS 0.06%
- Veröffentlicht 07.05.2025 22:52:25
- Zuletzt bearbeitet 08.05.2025 14:39:09
On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or pos...