Security Advisory 0128
Date: December 16, 2025
| Revision | Date | Changes |
|---|---|---|
| 1.0 | December 16, 2025 | Initial release |
The CVE-ID tracking this issue: CVE-2025-8872
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H ( 6.5 / 10 )
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N ( 7.1 / 10 )
Common Weakness Enumeration: CWE-400: Uncontrolled Resource Consumption
This vulnerability is being tracked by BUG1203059
Description
On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted. This may cause disruption in the OSFPv3 routes on the switch.
This issue was discovered internally by Arista and is not aware of any malicious uses of this issue in customer networks.
Vulnerability Assessment
Affected Software
- 4.34.1F and below releases in the 4.34.x train
- 4.33.4M and below releases in the 4.33.x train
- 4.32.7M and below releases in the 4.32.x train
- 4.31.8M and below releases in the 4.31.x train
- All releases prior to 4.31.x train
Affected Platforms
- Arista EOS-based products:
- 710/710XP Series
- 720D Series
- 720XP/722XPM Series
- 750X Series
- 7010 Series
- 7010X Series
- 7020R Series
- 7130 Series running EOS
- 7150 Series
- 7160 Series
- 7170 Series
- 7050X/X2/X3/X4 Series
- 7060X/X2/X4/X5/X6 Series
- 7250X Series
- 7260X/X3 Series
- 7280E/R/R2/R3 Series
- 7300X/X3 Series
- 7320X Series
- 7358X4 Series
- 7368X4 Series
- 7388X5 Series
- 7500E/R/R2/R3 Series
- 7700R4 Series
- 7800R3/R4 Series
- AWE 5000 Series
- AWE 7200R Series
- CloudEOS
- cEOS-lab
- vEOS-lab
- CloudVision eXchange, virtual or physical appliance
- Arista Wireless Access Points
- CloudVision CUE, virtual appliance or physical appliance
- CloudVision CUE cloud service delivery
- CloudVision Portal, virtual appliance or physical appliance
- CloudVision as-a-Service
- CloudVision AGNI
- Arista 7130 Systems running MOS
- Arista Converged Cloud Fabric (formerly Big Switch BCF)
- Arista DANZ Monitoring Fabric (formerly Big Switch BMF)
- Arista Network Detection and Response (NDR) Security Platform (Formerly Awake NDR)
- Arista Edge Threat Management - Arista NG Firewall and Arista Micro Edge (Formerly Untangle)
- Arista NetVisor OS, Arista NetVisor UNUM, and Insight Analytics (Formerly Pluribus)
- VeloCloud Orchestrator (Formerly VeloCloud Orchestrator by Broadcom)
- VeloCloud Gateway (Formerly VeloCloud Gateway by Broadcom)
- VeloCloud Edge (Formerly VeloCloud Edge by Broadcom)
Required Configuration for Exploitation
In order to be vulnerable to CVE-2025-8872, the following condition must be met:
The OSFPv3 protocol must be configured in either the default or non default vrf and at least one neighbor must be present
switch>show ospfv3
OSPFv3 address-family ipv6
Routing Process "ospfv3" with ID 192.0.2.0 and Instance 0 VRF default
FIPS mode disabled
Maximum number of LSAs allowed 0
Exceed action disable
LSA limit for warning message 75%
Disabled-time 5 minutes, clear timeout 5 minutes
Incident count 0, incident count limit 5
It is an autonomous system boundary router and is not an area border router
Minimum LSA arrival interval 1000 msecs
Initial LSA throttle delay 1000 msecs
Minimum hold time for LSA throttle 5000 msecs
Maximum wait time for LSA throttle 5000 msecs
It has 1 fully adjacent neighbors
Number of areas in this router is 1. 1 normal, 0 stub, 0 nssa
Number of LSAs 8
Initial SPF schedule delay 0 msecs
Minimum hold time between two consecutive SPFs 5000 msecs
Current hold time between two consecutive SPFs 5000 msecs
Maximum wait time between two consecutive SPFs 5000 msecs
SPF algorithm last executed 00:04:52 ago
No scheduled SPF
Adjacency exchange-start threshold is 20
Maximum number of next-hops supported in ECMP is 128
Number of backbone neighbors is 0
Graceful-restart is not configured
Graceful-restart-helper mode is enabled
Area 0.0.0.0
Number of interface in this area is 1
It is a normal area
SPF algorithm executed 6 times
switch>show ospfv3 neighbor
OSPFv3 address-family ipv6
Routing Process "ospfv3" Instance 0 VRF default
Neighbor 192.0.3.0 VRF default priority is 1, state is Full
In area 0.0.0.0 interface Ethernet4
Adjacency was established 00:00:49 ago
Current state was established 00:00:49 ago
DR is 3.3.3.3 BDR is 2.2.2.2
Options is E R V6
Dead timer is due in 29 seconds
Graceful-restart-helper mode is Inactive
Graceful-restart attempts: 0
If OSFPv3 is not configured there is no exposure to this issue and the show command will not produce any output
switch>show ospfv3 switch>show ospfv3 neighbor
Indicators of Compromise
This vulnerability may lead to the OSFPv3 agent becoming non responsive and eventually restarting on the switch.
The OSFPv3 process being terminated due to a SIGQUIT may be an indication of the issue.
The following message may appear in “show logging”
Jan 1 00:00:41 switch ProcMgr: %PROCMGR-4-TERMINATE_PROCESS_SIGQUIT: Heartbeats from 'OSFPv3' (PID=1) missing for 601.0 secs -- terminating it with SIGQUIT. Process kernel stack is (). Syscall is (running).
The following messages may also appear under “/var/log/eos” (this requires bash access) which indicates the issue:
Jan 1 00:00:14 switch ProcMgr: %PROCMGR-6-PROCESS_TERMINATED: 'OSFPv3' (PID=1, status=131) has terminated. Jan 1 00:00:14 switch ProcMgr: %PROCMGR-6-PROCESS_RESTART: Restarting 'OSFPv3' immediately (it had PID=1)
These messages can be found with the following grep commands, when run from the bash shell:
grep "Heartbeats from 'OSFPv3' (PID=.*) missing for .* secs" /var/log/eos grep "Restarting 'OSFPv3' immediately" /var/log/eos
Mitigation
There is no workaround to mitigate the issue.
Resolution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience.
Arista recommends customers move to the latest version of each release that contains all the fixes listed below.
For more information about upgrading see: EOS User Manual: Upgrades and Downgrades
- 4.34.2F and later releases in the 4.34.x train
- 4.33.5M and later releases in the 4.33.x train
- 4.32.8M and later releases in the 4.32.x train
- 4.31.9M and later releases in the 4.31.x train
For More Information
If you require further assistance, or if you have any further questions regarding this security notice, please contact the Arista Networks Technical Assistance Center (TAC) by one of the following methods:
Open a Service Request
Contact information needed to open a new service request may be found at:
https://www.arista.com/en/support/customer-support
