<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/custom_data/rss_style/rss.xsl"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Arista Networks :: Security Advisories</title>
		<description><![CDATA[Arista Networks :: Security Advisories]]></description>
		<link>https://www.arista.com/en/support/advisories-notices/security-advisory</link>
		<lastBuildDate>Sat, 18 Apr 2026 21:00:08 +0000</lastBuildDate>
		<atom:link rel="self" type="application/rss+xml" href="https://www.arista.com/en/support/advisories-notices/security-advisory-csaf"/>
		<language>en-gb</language>
		<copyright>© 2026 Arista Networks, Inc. All rights reserved.</copyright>
		<managingEditor>webadmin@arista.com (Web Admin)</managingEditor>
		<item>
			<title>Security Advisory 0132</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_132_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_132_CSAF.json</guid>
			<description><![CDATA[
Date: December 30, 2025
 



Revision
Date
Changes


1.0
December 30, 2025
Initial release


1.1
February 3, 2026
Updated Required Configuration for Exploitation



The CVE-ID tracking this issue: CVE-2025-7048 CVSS:3.1 Base Score 4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSS:4.0 Base Score 5.3 (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) Common Weakness Enumeration: CWE-805 Buffer Access with Incorrect Length Value This vulnerability is bein ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 29 Dec 2025 21:55:09 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0127</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_127_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_127_CSAF.json</guid>
			<description><![CDATA[
Date: November 18, 2025
 



Revision
Date
Changes


1.0
November 18, 2025
Initial release



The CVE-ID tracking this issue: CVE-2025-8873 CVSSv3.1 Base Score: 7.5(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVSSv4.0 Base Score 8.7(CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)
Common Weakness Enumeration: CWE-1286: Improper Validation of Syntactic Correctness of InputThis vulnerability is being tracked by BUG 1246592
Description
On affected platforms run ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 17 Nov 2025 22:44:11 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0126</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_126_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_126_CSAF.json</guid>
			<description><![CDATA[
Date: November 18, 2025



Revision
Date
Changes


1.0
November 18, 2025
Initial release



The following issues were discovered during regular penetration testing of Arista’s EOS. Issues detailed cover CloudVision Exchange (CVX) based features including Media Control Services (MCS).
Issues covered in this Advisory:

CVE-2025-5088 - An authenticated Redis session could be used to obtain full root access to all servers in the CVX cluster
CVE-2025-5089 - Malformed messages rec ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 17 Nov 2025 22:36:51 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0125</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_125_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_125_CSAF.json</guid>
			<description><![CDATA[
Date: November 11, 2025



Revision
Date
Changes


1.0
November 11, 2025
Initial release



The CVE-ID tracking this issue: CVE-2025-8870 CVSS:3.1 Base Score 4.9 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) CVSS:4.0 Base Score 5.6 (CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H) Common Weakness Enumeration: CWE-248: Uncaught Exception This vulnerability is being tracked by BUG 1206724
Description
On affected platforms running Arista EOS, certain serial conso ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 11 Nov 2025 06:29:22 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0122</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_122_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_122_CSAF.json</guid>
			<description><![CDATA[
Date: July 22, 2025



Revision
Date
Changes


1.0
July 22, 2025
Initial release


1.1
September 30, 2025
Added CSAF File



The CVE-ID tracking this issue: CVE-2025-3456 CVSSv3.1 Base Score: 3.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N) Common Weakness Enumeration: CWE-532: Insertion of Sensitive Information into Log File This vulnerability is being tracked by BUG1114420
Description
On affected platforms running Arista EOS, the global common encryption key configura ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 22 Jul 2025 00:09:35 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0121</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_121_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_121_CSAF.json</guid>
			<description><![CDATA[
Date: July 22, 2025
 



Revision
Date
Changes


1.0
July 22, 2025
Initial release


1.1
August 8, 2025
Updated Mitigation sectionUpdated EOS versions which CVE-2025-6188 has been fixed


1.2
September 30, 2025
Added CSAF file



The CVE-ID tracking this issue: CVE-2025-6188 CVSSv3.1 Base Score: 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) Common Weakness Enumeration: CWE-288 Authentication Bypass Using an Alternate Path or Channel This vulnerability is being tr ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 22 Jul 2025 00:08:44 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0120</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_120_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_120_CSAF.json</guid>
			<description><![CDATA[
Date: May 27, 2025



Revision
Date
Changes


1.0
May 27, 2025
Initial release



The CVE-ID tracking this issue: CVE-2025-2826 CVSSv3.1 Base Score: 2.6 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) Common Weakness Enumeration: CWE-284: Improper Access Control This vulnerability is being tracked by BUG 795398.
Description
On affected platforms running Arista EOS, ACL policies may not be enforced. IPv4 ingress ACL, MAC ingress ACL, or IPv6 standard ingress ACL enabled on one o ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 27 May 2025 15:22:08 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0119</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_119_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_119_CSAF.json</guid>
			<description><![CDATA[
Date: May 27, 2025



Revision
Date
Changes


1.0
May 27, 2025
Initial release


1.1
June 4, 2025
Updated Resolutions Section and Affected EOS Version



The CVE-ID tracking this issue: CVE-2025-2796 CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) Common Weakness Enumeration: CWE-284: Improper Access Control This vulnerability is being tracked by BUG1073719
Description
On affected platforms with hardware IPSec support running Arista EOS with IPsec  ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 27 May 2025 15:21:23 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0118</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_118_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_118_CSAF.json</guid>
			<description><![CDATA[
Date: May 20, 2025  



Revision
Date
Changes


1.0
May 20, 2025
Initial release



The CVE-ID tracking this issue: CVE-2024-11185 CVSSv3.1 Base Score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) Common Weakness Enumeration: CWE-1189: Improper Isolation of Shared Resources on System-on-a-Chip (SoC) This vulnerability is being tracked by BUG1009562
Description
On affected platforms running Arista EOS, ingress traffic on Layer 2 ports may, under certain conditions, be imp ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 20 May 2025 17:56:46 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0117</title>
			<link>https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_117_CSAF.json</link>
			<guid isPermaLink="true">https://www.arista.com/assets/data/SecurityAdvisories/CSAF/arista_networks_security_advisory_117_CSAF.json</guid>
			<description><![CDATA[
Date: May 6, 2025



Revision
Date
Changes


1.0
May 6, 2025
Initial release


1.1
May 20, 2025
Updated affected Arista productsUpdated mitigation option #3



The CVE-ID tracking this issue: CVE-2025-0936 CVSSv3.1 Base Score: 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) Common Weakness Enumeration: CWE-256: Plaintext Storage of a Password This vulnerability is being tracked by BUG 1045796
Description
On affected platforms running Arista EOS with a gNMI transport en ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 05 May 2025 23:58:07 +0000</pubDate>
		</item>
	</channel>
</rss>