<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/custom_data/rss_style/rss.xsl"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Arista Networks :: Security Advisories</title>
		<description><![CDATA[Arista Networks :: Security Advisories]]></description>
		<link>https://www.arista.com/en/support/advisories-notices/security-advisory</link>
		<lastBuildDate>Sat, 09 May 2026 04:17:04 +0000</lastBuildDate>
		<atom:link rel="self" type="application/rss+xml" href="https://www.arista.com/en/support/advisories-notices/security-advisory-rss"/>
		<language>en-gb</language>
		<copyright>© 2026 Arista Networks, Inc. All rights reserved.</copyright>
		<managingEditor>webadmin@arista.com (Web Admin)</managingEditor>
		<item>
			<title>Security Advisory 0138</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/24019-security-advisory-0138</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/24019-security-advisory-0138</guid>
			<description><![CDATA[
Date: May 8, 2026
 



Revision
Date
Changes


1.0
May 8, 2026
Initial release



 
The CVE-ID’s tracking this issue: CVE-2026-43284, and CVE-2026-43500.
Description
Arista Networks is providing this security update in response to a recent, publicly disclosed security vulnerability widely known as “Dirty Frag”. Exploitation of this issue allows for an unprivileged local user to gain root access to a device by running an executable binary. Access to an environment where arbit ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Fri, 08 May 2026 22:22:55 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0137</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/24005-security-advisory-0137</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/24005-security-advisory-0137</guid>
			<description><![CDATA[
Date: May 5, 2026



Revision
Date
Changes


1.0
May 5, 2026
Initial release


1.1
May 7, 2026
Clarified 7280R3, 7500R3 and 7800R3 exposure is limited



The CVE-ID tracking this issue: CVE-2026-7473 CVSSv3.1 Base Score: 5.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N) CVSSv4.0 Base Score: 6.8 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N) Common Weakness Enumeration: CWE-1023: Incomplete Comparison with Missing FactorsThis vulnerability is being tracke ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 05 May 2026 03:41:31 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0136</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/24004-security-advisory-0136</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/24004-security-advisory-0136</guid>
			<description><![CDATA[
Date: May 1, 2026



Revision
Date
Changes


1.0
May 1, 2026
Initial release


1.1
May 7, 2026
Additional required configuration for exploitation information added



The CVE-ID tracking this issue: CVE-2026-31431 CVSSv3.1 Base Score: 7.8 (CVSS:3.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Common Weakness Enumeration: CWE-1288: Improper Validation of Consistency within Input
This vulnerability is being tracked by the following bugs:BUG 1640641 (CloudVision Portal), BUG ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Sat, 02 May 2026 00:09:38 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0135</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23784-security-advisory-0135</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23784-security-advisory-0135</guid>
			<description><![CDATA[
 
Date: April 7, 2026
 



Revision
Date
Changes


1.0
April 7th, 2026
Initial release


1.1
April 28th, 2026
Correction to fixed releases(fixed in 4.32.10, not 4.32.9)



The CVE-ID tracking this issue: CVE-2025-31133 CVSSv3.1 Base Score: 7.8/10 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS:4.0 Base Score: 7.3/10 (CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)Common Weakness Enumeration: CWE-61: UNIX Symbolic Link (Symlink) Following
The CVE-ID t ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 06 Apr 2026 18:13:39 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0134</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23419-security-advisory-0134</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23419-security-advisory-0134</guid>
			<description><![CDATA[
 
Date: February 17, 2026
 



Revision
Date
Changes


1.0
February 17, 2026
Initial release



The CVE-ID tracking this issue: CVE-2026-2379 CVSSv3.1 Base Score: 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)Common Weakness Enumeration: CWE-672: Operation on a Resource after Expiration or Release This vulnerability is being tracked by BUG 1188976
Description
On affected platforms with hardware IPSec support running Arista EOS with certain IPsec features enabled, EOS may ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 17 Feb 2026 01:17:46 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0133</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23399-security-advisory-0133</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23399-security-advisory-0133</guid>
			<description><![CDATA[
Date: February 3, 2026



Revision
Date
Changes


1.0
February 3, 2026
Initial release



Description
Several vulnerabilities exist for the Arista Edge Threat Management - Arista NG Firewall (NGFW). On affected platforms, an administrative account logged into the user interface is subject to several command injection vulnerabilities.
1) Description: Administrative diagnostics command injection vulnerability CVE: CVE-2025-6978 CVSSv3.1 Base Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/U ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 03 Feb 2026 06:45:43 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0132</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132</guid>
			<description><![CDATA[
Date: December 30, 2025
 



Revision
Date
Changes


1.0
December 30, 2025
Initial release


1.1
February 3, 2026
Updated Required Configuration for Exploitation



The CVE-ID tracking this issue: CVE-2025-7048 CVSS:3.1 Base Score 4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSS:4.0 Base Score 5.3 (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) Common Weakness Enumeration: CWE-805 Buffer Access with Incorrect Length Value This vulnerability is bein ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 29 Dec 2025 21:55:09 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0131</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23119-security-advisory-0131</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23119-security-advisory-0131</guid>
			<description><![CDATA[
Date: December 23, 2025



Revision
Date
Changes


1.0
July 5, 2020
Initial release


1.1
December 23, 2025
Updated to Arista Format



 
NOTICE: VeloCloud is now an Arista product.Arista Networks has reposted this advisory that was originally posted by VMware July 5, 2020
The CVE-ID tracking this issue: CVE-2020-3973 CVSSv3.1 Base Score: 8.5 This vulnerability was originally published as VMSA-2020-0016
Description
An SQL-injection vulnerability in VeloCloud was private ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 22 Dec 2025 22:10:54 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0130</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23118-security-advisory-0130</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23118-security-advisory-0130</guid>
			<description><![CDATA[
Date: December 23, 2025



Revision
Date
Changes


1.0
October 16, 2019
Initial release


1.1
December 23, 2025
Updated to Arista Format



 
NOTICE: VeloCloud is now an Arista product.Arista Networks has reposted this advisory that was originally posted by VMware October 16, 2019
The CVE-ID tracking this issue: CVE-2019-5533 CVSSv3.1 Base Score: 4.3 This vulnerability was originally published as VMSA-2019-0017
Description
Arista SD-WAN by VeloCloud update addresses inf ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 22 Dec 2025 22:09:18 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0129</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23117-security-advisory-0129</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23117-security-advisory-0129</guid>
			<description><![CDATA[
Date: December 23, 2025



Revision
Date
Changes


1.0
May 13, 2018
Initial release


1.1
December 23, 2025
Updated to Arista Format



 
NOTICE: VeloCloud is now an Arista product.Arista Networks has reposted this advisory that was originally posted by VMware May 13, 2018
The CVE-ID tracking this issue: CVE-2018-6961 CVSSv3.1 Base Score: 8.1 This vulnerability was originally published as VMSA-2018-0011
Description
Unauthenticated Command Injection vulnerability in VMwa ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 22 Dec 2025 22:07:29 +0000</pubDate>
		</item>
	</channel>
</rss>