Security Advisory 0136
Date: May 1, 2026
| Revision | Date | Changes |
|---|---|---|
| 1.0 | May 1, 2026 | Initial release |
The CVE-ID tracking this issue: CVE-2026-31431
CVSSv3.1 Base Score: 7.8 (CVSS:3.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Common Weakness Enumeration: CWE-1288: Improper Validation of Consistency within Input
This vulnerability is being tracked by the following bugs:
BUG 1640641 (CloudVision Portal), BUG 1657079 (Velocloud Orchestrator), BUG 1657148 (Velocloud Gateway), BUG 1644638 (VeloCloud Edge), BUG 1656945 (CloudVision AGNI appliance)
Description
Arista Networks is providing this security update in response to a recent, publicly disclosed security vulnerability widely known as “Copy Fail”. Exploitation of this issue allows for an unprivileged local user to gain root access to a device by running a script or executable binary. Access to an environment where arbitrary code can be executed is required for this vulnerability to be exploitable.
This issue was reported externally and is also known as Copy Fail.
The external researchers website for this issue is https://copy.fail/.
Vulnerability Assessment
Affected Software
- 2024.2.0 and later releases in the 2024.x train
- 2025.1.0 and later releases in the 2025.x train
- 2026.1.0
- Release 6.4.x
- Release 6.1.x
- Release 5.2.x
- Release 6.4.X
- Release 6.2.0
- Release 6.1.x
- Release 5.2.x
CloudVision AGNI - Virtual or physical appliance
Affected Platforms
- CloudVision Portal, virtual appliance or physical appliance
- VeloCloud Orchestrator (Formerly VeloCloud Orchestrator by Broadcom)
- VeloCloud Gateway (Formerly VeloCloud Gateway by Broadcom)
- VeloCloud Edge (Formerly VeloCloud Edge by Broadcom)
- CloudVision AGNI - Virtual or physical appliance
- Arista EOS-based products:
- 710 Series
- 720D Series
- 720XP/722XPM Series
- 750X Series
- 7010 Series
- 7010X Series
- 7020R Series
- 7130 Series running EOS
- 7150 Series
- 7160 Series
- 7170 Series
- 7050X/X2/X3/X4 Series
- 7060X/X2/X4/X5/X6 Series
- 7250X Series
- 7260X/X3 Series
- 7280E/R/R2/R3/R4 Series
- 7300X/X3 Series
- 7320X Series
- 7358X4 Series
- 7368X4 Series
- 7388X5 Series
- 7500E/R/R2/R3 Series
- 7800R3/R4 Series
- 7700R4 Series
- AWE 5000 Series
- AWE 7200R Series
- CloudEOS
- cEOS-lab
- vEOS-lab
- CloudVision eXchange, virtual or physical appliance
- Arista Wireless Access Points
- CloudVision CUE, virtual appliance or physical appliance
- CloudVision CUE cloud service delivery
- CloudVision as-a-Service
- Arista Network Detection and Response (NDR) Security Platform (Formerly Awake NDR)
- Arista 7130 Systems running MOS
- Arista Converged Cloud Fabric (formerly Big Switch BCF)
- Arista DANZ Monitoring Fabric (formerly Big Switch BMF)
- CloudVision AGNI - Cloud service delivery
- Arista Edge Threat Management - Arista NG Firewall and Arista Micro Edge (Formerly Untangle)
- Arista NetVisor OS, Arista NetVisor UNUM, and Insight Analytics (Formerly Pluribus)
Required Configuration for Exploitation
CloudVision Portal
This vulnerability requires the ability to execute python scripts via change control, studios or custom actions within CloudVision.CloudVision Web GUI users possessing specific permissions may be capable of doing so which would allow them to exploit this vulnerability. This includes users assigned the "Network Admin" role or any custom roles configured with write permissions for executing change controls, studios, or custom actions.
- Go to Settings → Access Control → Roles.
- Review each role individually, specifically examining the Provisioning, Settings, and Studios categories.
- Identify roles that grant both Read and Write access within these categories.
- Proceed to Settings → Access Control → Users.
- Use the filter or sort functions by role to determine which users are currently assigned to the identified roles.

Indicators of Compromise
There are no indicators of compromise for this issue.
Mitigation
CloudVision
This issue can be mitigated on CloudVision by updating the kernel to denylist algif_aead_init.
This requires stopping CloudVision components, applying the fix, rebooting the system and then bringing up CloudVision.
For CloudVision releases 2025.x and 2026.x trains:
# Run the following command on any one node. cvpi stop all # run the next 2 commands on each node
grubby --update-kernel=ALL
--args="initcall_blacklist=algif_aead_init"
systemctl reboot # Post reboot of all nodes, login to any one node and start all components cvpi start all
For CloudVision release train 2024.2.x:
# Unload if currently loaded mmod algif_aead # Prevent it from loading again echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf
After rebooting, the rmmod mitigation can be verified via running the following:
# Should return nothing lsmod | grep algif_aead # Should show "install /bin/false" modprobe -n -v algif_aead
Note: These mitigations do not persist across upgrades and have to be applied again until the system is upgraded to a CloudVision release with the fixes.
Resolution
Remediated software versions are being developed and this advisory will be updated as they are published.
Hotfix
There are no hotfixes planned for this issue at this point in time.
For More Information
If you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:
Open a Service Request
Contact information needed to open a new service request may be found at:
https://www.arista.com/en/support/customer-support
