<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/custom_data/rss_style/rss.xsl"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Arista Networks :: Security Advisories</title>
		<description><![CDATA[Arista Networks :: Security Advisories]]></description>
		<link>https://www.arista.com/en/support/advisories-notices/security-advisory</link>
		<lastBuildDate>Mon, 16 Mar 2026 15:31:30 +0000</lastBuildDate>
		<atom:link rel="self" type="application/rss+xml" href="https://www.arista.com/en/support/advisories-notices/security-advisory-rss"/>
		<language>en-gb</language>
		<copyright>© 2026 Arista Networks, Inc. All rights reserved.</copyright>
		<managingEditor>webadmin@arista.com (Web Admin)</managingEditor>
		<item>
			<title>Security Advisory 0134</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23419-security-advisory-0134</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23419-security-advisory-0134</guid>
			<description><![CDATA[
 
Date: February 17, 2026
 



Revision
Date
Changes


1.0
February 17, 2026
Initial release



The CVE-ID tracking this issue: CVE-2026-2379 CVSSv3.1 Base Score: 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)Common Weakness Enumeration: CWE-672: Operation on a Resource after Expiration or Release This vulnerability is being tracked by BUG 1188976
Description
On affected platforms with hardware IPSec support running Arista EOS with certain IPsec features enabled, EOS may ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 17 Feb 2026 01:17:46 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0133</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23399-security-advisory-0133</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23399-security-advisory-0133</guid>
			<description><![CDATA[
Date: February 3, 2026



Revision
Date
Changes


1.0
February 3, 2026
Initial release



Description
Several vulnerabilities exist for the Arista Edge Threat Management - Arista NG Firewall (NGFW). On affected platforms, an administrative account logged into the user interface is subject to several command injection vulnerabilities.
1) Description: Administrative diagnostics command injection vulnerability CVE: CVE-2025-6978 CVSSv3.1 Base Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/U ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 03 Feb 2026 06:45:43 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0132</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132</guid>
			<description><![CDATA[
Date: December 30, 2025
 



Revision
Date
Changes


1.0
December 30, 2025
Initial release


1.1
February 3, 2026
Updated Required Configuration for Exploitation



The CVE-ID tracking this issue: CVE-2025-7048 CVSS:3.1 Base Score 4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSS:4.0 Base Score 5.3 (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N) Common Weakness Enumeration: CWE-805 Buffer Access with Incorrect Length Value This vulnerability is bein ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 29 Dec 2025 21:55:09 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0131</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23119-security-advisory-0131</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23119-security-advisory-0131</guid>
			<description><![CDATA[
Date: December 23, 2025



Revision
Date
Changes


1.0
July 5, 2020
Initial release


1.1
December 23, 2025
Updated to Arista Format



 
NOTICE: VeloCloud is now an Arista product.Arista Networks has reposted this advisory that was originally posted by VMware July 5, 2020
The CVE-ID tracking this issue: CVE-2020-3973 CVSSv3.1 Base Score: 8.5 This vulnerability was originally published as VMSA-2020-0016
Description
An SQL-injection vulnerability in VeloCloud was private ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 22 Dec 2025 22:10:54 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0130</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23118-security-advisory-0130</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23118-security-advisory-0130</guid>
			<description><![CDATA[
Date: December 23, 2025



Revision
Date
Changes


1.0
October 16, 2019
Initial release


1.1
December 23, 2025
Updated to Arista Format



 
NOTICE: VeloCloud is now an Arista product.Arista Networks has reposted this advisory that was originally posted by VMware October 16, 2019
The CVE-ID tracking this issue: CVE-2019-5533 CVSSv3.1 Base Score: 4.3 This vulnerability was originally published as VMSA-2019-0017
Description
Arista SD-WAN by VeloCloud update addresses inf ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 22 Dec 2025 22:09:18 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0129</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23117-security-advisory-0129</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23117-security-advisory-0129</guid>
			<description><![CDATA[
Date: December 23, 2025



Revision
Date
Changes


1.0
May 13, 2018
Initial release


1.1
December 23, 2025
Updated to Arista Format



 
NOTICE: VeloCloud is now an Arista product.Arista Networks has reposted this advisory that was originally posted by VMware May 13, 2018
The CVE-ID tracking this issue: CVE-2018-6961 CVSSv3.1 Base Score: 8.1 This vulnerability was originally published as VMSA-2018-0011
Description
Unauthenticated Command Injection vulnerability in VMwa ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 22 Dec 2025 22:07:29 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0128</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/23115-security-advisory-0128</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/23115-security-advisory-0128</guid>
			<description><![CDATA[
Date: December 16, 2025



Revision
Date
Changes


1.0
December 16, 2025
Initial release



 
The CVE-ID tracking this issue: CVE-2025-8872 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H ( 6.5 / 10 ) CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N ( 7.1 / 10 ) Common Weakness Enumeration: CWE-400: Uncontrolled Resource Consumption This vulnerability is being tracked by BUG1203059
Description
On affected platforms running Arista EOS with OSPFv3 configured, a spec ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 15 Dec 2025 19:04:23 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0127</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/22869-security-advisory-0127</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/22869-security-advisory-0127</guid>
			<description><![CDATA[
Date: November 18, 2025
 



Revision
Date
Changes


1.0
November 18, 2025
Initial release



The CVE-ID tracking this issue: CVE-2025-8873 CVSSv3.1 Base Score: 7.5(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVSSv4.0 Base Score 8.7(CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)
Common Weakness Enumeration: CWE-1286: Improper Validation of Syntactic Correctness of InputThis vulnerability is being tracked by BUG 1246592
Description
On affected platforms run ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 17 Nov 2025 22:44:11 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0126</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/22868-security-advisory-0126</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/22868-security-advisory-0126</guid>
			<description><![CDATA[
Date: November 18, 2025



Revision
Date
Changes


1.0
November 18, 2025
Initial release



The following issues were discovered during regular penetration testing of Arista’s EOS. Issues detailed cover CloudVision Exchange (CVX) based features including Media Control Services (MCS).
Issues covered in this Advisory:

CVE-2025-5088 - An authenticated Redis session could be used to obtain full root access to all servers in the CVX cluster
CVE-2025-5089 - Malformed messages rec ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Mon, 17 Nov 2025 22:36:51 +0000</pubDate>
		</item>
		<item>
			<title>Security Advisory 0125</title>
			<link>https://www.arista.com/en/support/advisories-notices/security-advisory/22811-security-advisory-0125</link>
			<guid isPermaLink="true">https://www.arista.com/en/support/advisories-notices/security-advisory/22811-security-advisory-0125</guid>
			<description><![CDATA[
Date: November 11, 2025



Revision
Date
Changes


1.0
November 11, 2025
Initial release



The CVE-ID tracking this issue: CVE-2025-8870 CVSS:3.1 Base Score 4.9 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) CVSS:4.0 Base Score 5.6 (CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H) Common Weakness Enumeration: CWE-248: Uncaught Exception This vulnerability is being tracked by BUG 1206724
Description
On affected platforms running Arista EOS, certain serial conso ...]]></description>
			<category>Security Advisories</category>
			<pubDate>Tue, 11 Nov 2025 06:29:22 +0000</pubDate>
		</item>
	</channel>
</rss>