Arista Networks Eos vulnerabilities
27 known vulnerabilities affecting arista_networks/eos.
Total CVEs
27
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH12MEDIUM11LOW2
Vulnerabilities
Page 1 of 2
CVE-2025-7048MEDIUMCVSS 5.3≥ 4.34.3.0, ≤ 4.34.3.1M≥ 4.33.0, ≤ 4.33.5M+3 more2026-01-06
CVE-2025-7048 [MEDIUM] CWE-805 CVE-2025-7048: On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can c
On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.
cvelistv5nvd
CVE-2025-8872HIGHCVSS 7.1≥ 4.34.0, ≤ 4.34.1F≥ 4.33.0, ≤ 4.33.4M+3 more2025-12-16
CVE-2025-8872 [HIGH] CWE-400 CVE-2025-8872: On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can caus
On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted. This may cause disruption in the OSFPv3 routes on the switch.
This issue was discovered internally by Arista and is not aware of any malicious uses
cvelistv5nvd
CVE-2025-8870MEDIUMCVSS 5.6v4.34.2FX2025-11-14
CVE-2025-8870 [MEDIUM] CWE-248 CVE-2025-8870: On affected platforms running Arista EOS, certain serial console input might result in an unexpected
On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153
cvelistv5nvd
CVE-2025-6188HIGHCVSS 7.5≥ 4.33.0, ≤ 4.33.1F≥ 4.33.1.0, ≤ 4.33.1.2F+3 more2025-08-25
CVE-2025-6188 [HIGH] CWE-290 CVE-2025-6188: On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may b
On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do not perform some form of authentication.
cvelistv5nvd
CVE-2025-3456LOWCVSS 3.8v4.34.0F≥ 4.33.0, ≤ 4.33.3F+4 more2025-08-25
CVE-2025-3456 [LOW] CWE-532 CVE-2025-3456: On affected platforms running Arista EOS, the global common encryption key configuration may be logg
On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-config could then be used to obtain protocol specific passwords in cases where symmetric passwords ar
cvelistv5nvd
CVE-2024-11185MEDIUMCVSS 6.5≥ 4.29.0, ≤ 4.29.10M≥ 4.30.0, ≤ 4.30.9M+3 more2025-05-27
CVE-2024-11185 [MEDIUM] CVE-2024-11185: On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain condit
On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be improperly forwarded to ports associated with different VLANs, resulting in a breach of VLAN isolation and segmentation boundaries.
cvelistv5nvd
CVE-2025-2796MEDIUMCVSS 5.3≥ 4.33.0, ≤ 4.33.2F2025-05-27
CVE-2025-2796 [MEDIUM] CVE-2025-2796: On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-rep
On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal anti-replay protection, will instead be forwarded due to this vulnerability.
Note: this issue does not
cvelistv5nvd
CVE-2025-2826LOWCVSS 2.6v4.33.2F2025-05-27
CVE-2025-2826 [LOW] CWE-1284 CVE-2025-2826: n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ing
n affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one or more ethernet or LAG interfaces may result in ACL policies not being enforced for ingress packets. This can cause incoming packets to incorrectly be allowed or denied. The two symptoms of this issue
cvelistv5nvd
CVE-2024-9448HIGHCVSS 7.5≥ 4.33.0, ≤ 4.33.0F≥ 4.32.0, ≤ 4.32.3M+2 more2025-05-08
CVE-2024-9448 [HIGH] CWE-1284 CVE-2024-9448: On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cau
On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being
cvelistv5nvd
CVE-2025-0936MEDIUMCVSS 6.5≥ 4.33.0, ≤ 4.33.1≥ 4.32.0, ≤ 4.32.3M+2 more2025-05-07
CVE-2025-0936 [MEDIUM] CWE-256 CVE-2025-0936: On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File Transf
On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly on other remote accounting servers (i.e. TACACS, RADIUS, etc).
cvelistv5nvd
CVE-2025-1260CRITICALCVSS 9.1≥ 4.33.0, ≤ 4.33.1≥ 4.32.0, ≤ 4.32.3+4 more2025-03-04
CVE-2025-1260 [CRITICAL] CWE-284 CVE-2025-1260: On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when
On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in unexpected configuration/operations being applied to the switch.
cvelistv5nvd
CVE-2025-1259HIGHCVSS 7.7≥ 4.33.0, ≤ 4.33.1≥ 4.32.0, ≤ 4.32.3+4 more2025-03-04
CVE-2025-1259 [HIGH] CWE-284 CVE-2025-1259: On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when
On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in users retrieving data that should not have been available
cvelistv5nvd
CVE-2024-9135MEDIUMCVSS 5.3v4.33.0≥ 4.31.0, ≤ 4.31.5+4 more2025-03-04
CVE-2024-9135 [MEDIUM] CWE-401 CVE-2024-9135: On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the
On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping.
cvelistv5nvd
CVE-2024-8000MEDIUMCVSS 5.3≥ 4.32.0, ≤ 4.32.4M≥ 4.31.0, ≤ 4.31.5M+1 more2025-03-04
CVE-2024-8000 [MEDIUM] CWE-1284 CVE-2024-8000: On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where
On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restart.
Note: supplicants with pending captive-portal authentication during ASU would be impacted wit
cvelistv5nvd
CVE-2024-5872MEDIUMCVSS 6.5≥ 4.32.0F, ≤ 4.32.2F≥ 4.31.0M, ≤ 4.31.4M+3 more2025-01-10
CVE-2024-5872 [MEDIUM] CVE-2024-5872: On affected platforms running Arista EOS, a specially crafted packet with incorrect VLAN tag might b
On affected platforms running Arista EOS, a specially crafted packet with incorrect VLAN tag might be copied to CPU, which may cause incorrect control plane behavior related to the packet, such as route flaps, multicast routes learnt, etc.
cvelistv5nvd
CVE-2024-7095MEDIUMCVSS 4.3≥ 4.32.0F, ≤ 4.32.2F≥ 4.31.0M, ≤ 4.31.4M+9 more2025-01-10
CVE-2024-7095 [MEDIUM] CWE-401 CVE-2024-7095: On affected platforms running Arista EOS with SNMP configured, if “snmp-server transmit max-size” is
On affected platforms running Arista EOS with SNMP configured, if “snmp-server transmit max-size” is configured, under some circumstances a specially crafted packet can cause the snmpd process to leak memory. This may result in the snmpd process being terminated (causing SNMP requests to time out until snmpd is restarted) and memory pressure for other
cvelistv5nvd
CVE-2023-3646HIGHCVSS 7.5≥ 4.28.2F, ≤ 4.28.5.1M ≥ 4.29.0, ≤ 4.29.1F2023-08-29
CVE-2023-3646 [MEDIUM] CWE-125 CVE-2023-3646: On affected platforms running Arista EOS with mirroring to multiple destinations configured, an inte
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
cvelistv5nvd
CVE-2023-24548MEDIUMCVSS 6.5≥ 4.25.0F, ≤ =4.25.0F≥ 4.24.0, ≤ <=4.24.11M+2 more2023-08-29
CVE-2023-24548 [MEDIUM] CWE-120 CVE-2023-24548: On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets recei
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
cvelistv5nvd
CVE-2023-24511HIGHCVSS 7.5v4.28.0 4.28.5.1Mv4.27.0 4.27.8.1M+4 more2023-04-12
CVE-2023-24511 [MEDIUM] CWE-401 CVE-2023-24511: On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vuln
cvelistv5nvd
CVE-2023-24545HIGHCVSS 7.5≥ 4.29.0, ≤ 4.29.1F≥ 4.28.0, ≤ 4.28.4M+2 more2023-04-12
CVE-2023-24545 [HIGH] CWE-400 CVE-2023-24545: On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can l
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
cvelistv5nvd
1 / 2Next →