Date: May 1, 2026

Revision Date Changes
1.0 May 1, 2026 Initial release

The CVE-ID tracking this issue: CVE-2026-31431
CVSSv3.1 Base Score: 7.8 (CVSS:3.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Common Weakness Enumeration: CWE-1288: Improper Validation of Consistency within Input

This vulnerability is being tracked by the following bugs:
BUG 1640641 (CloudVision Portal), BUG 1657079 (Velocloud Orchestrator), BUG 1657148 (Velocloud Gateway), BUG 1644638 (VeloCloud Edge), BUG 1656945 (CloudVision AGNI appliance)

Description

Arista Networks is providing this security update in response to a recent, publicly disclosed security vulnerability widely known as “Copy Fail”. Exploitation of this issue allows for an unprivileged local user to gain root access to a device by running a script or executable binary. Access to an environment where arbitrary code can be executed is required for this vulnerability to be exploitable.

This issue was reported externally and is also known as Copy Fail.
The external researchers website for this issue is https://copy.fail/.

Vulnerability Assessment

Affected Software

CloudVision Portal
  • 2024.2.0 and later releases in the 2024.x train
  • 2025.1.0 and later releases in the 2025.x train
  • 2026.1.0
VeloCloud Orchestrator (Formerly VeloCloud Orchestrator by Broadcom)
  • Release 6.4.x
  • Release 6.1.x
  • Release 5.2.x
VeloCloud Gateway (Formerly VeloCloud Gateway by Broadcom)
  • Release 6.4.X
  • Release 6.2.0
  • Release 6.1.x
  • Release 5.2.x

CloudVision AGNI - Virtual or physical appliance

Affected Platforms

The following products are affected by this vulnerability:
  • CloudVision Portal, virtual appliance or physical appliance
  • VeloCloud Orchestrator (Formerly VeloCloud Orchestrator by Broadcom)
  • VeloCloud Gateway (Formerly VeloCloud Gateway by Broadcom)
  • VeloCloud Edge (Formerly VeloCloud Edge by Broadcom)
  • CloudVision AGNI - Virtual or physical appliance
The following product versions and platforms are not affected by this vulnerability:

 

  • Arista EOS-based products:
    • 710 Series
    • 720D Series
    • 720XP/722XPM Series
    • 750X Series
    • 7010 Series
    • 7010X Series
    • 7020R Series
    • 7130 Series running EOS
    • 7150 Series
    • 7160 Series
    • 7170 Series
    • 7050X/X2/X3/X4 Series
    • 7060X/X2/X4/X5/X6 Series
    • 7250X Series
    • 7260X/X3 Series
    • 7280E/R/R2/R3/R4 Series
    • 7300X/X3 Series
    • 7320X Series
    • 7358X4 Series
    • 7368X4 Series
    • 7388X5 Series
    • 7500E/R/R2/R3 Series
    • 7800R3/R4 Series
    • 7700R4 Series
    • AWE 5000 Series
    • AWE 7200R Series
    • CloudEOS
    • cEOS-lab
    • vEOS-lab
    • CloudVision eXchange, virtual or physical appliance
  • Arista Wireless Access Points
  • CloudVision CUE, virtual appliance or physical appliance
  • CloudVision CUE cloud service delivery
  • CloudVision as-a-Service
  • Arista Network Detection and Response (NDR) Security Platform (Formerly Awake NDR)
  • Arista 7130 Systems running MOS
  • Arista Converged Cloud Fabric (formerly Big Switch BCF)
  • Arista DANZ Monitoring Fabric (formerly Big Switch BMF)
  • CloudVision AGNI - Cloud service delivery
 
The following product versions and platforms are under triage to determine if they are affected by this vulnerability:
 
  • Arista Edge Threat Management - Arista NG Firewall and Arista Micro Edge (Formerly Untangle)
  • Arista NetVisor OS, Arista NetVisor UNUM, and Insight Analytics (Formerly Pluribus)

Required Configuration for Exploitation

CloudVision Portal

This vulnerability requires the ability to execute python scripts via change control, studios or custom actions within CloudVision.CloudVision Web GUI users possessing specific permissions may be capable of doing so which would allow them to exploit this vulnerability. This includes users assigned the "Network Admin" role or any custom roles configured with write permissions for executing change controls, studios, or custom actions.

To identify users with non-default roles, follow these steps:
  1. Go to Settings → Access Control → Roles.
  2. Review each role individually, specifically examining the Provisioning, Settings, and Studios categories.
  3. Identify roles that grant both Read and Write access within these categories.
  4. Proceed to Settings → Access Control → Users.
  5. Use the filter or sort functions by role to determine which users are currently assigned to the identified roles.
 

CloudVision Portal

Indicators of Compromise

There are no indicators of compromise for this issue.

Mitigation

CloudVision

This issue can be mitigated on CloudVision by updating the kernel to denylist algif_aead_init.
This requires stopping CloudVision components, applying the fix, rebooting the system and then bringing up CloudVision.

For CloudVision releases 2025.x and 2026.x trains:

# Run the following command on any one node.
cvpi stop all 
# run the next 2 commands on each node
grubby --update-kernel=ALL
--args="initcall_blacklist=algif_aead_init"
systemctl reboot # Post reboot of all nodes, login to any one node and start all components  cvpi start all 
 

  

For CloudVision release train 2024.2.x:

# Unload if currently loaded
mmod algif_aead
 
# Prevent it from loading again
echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
 

 

After rebooting, the rmmod mitigation can be verified via running the following:

# Should return nothing
lsmod | grep algif_aead
 
# Should show "install /bin/false"
modprobe -n -v algif_aead
 

 

Note: These mitigations do not persist across upgrades and have to be applied again until the system is upgraded to a CloudVision release with the fixes.

 

Resolution

Remediated software versions are being developed and this advisory will be updated as they are published.

 

Hotfix

There are no hotfixes planned for this issue at this point in time.

For More Information

If you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:

Open a Service Request

Contact information needed to open a new service request may be found at:
https://www.arista.com/en/support/customer-support