
CVE-2024-9448 – On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropp
https://notcve.org/view.php?id=CVE-2024-9448
08 May 2025 — On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being delivered to unexpected destinations. • https://www.arista.com/en/support/advisories-notices/security-advisory/21121-security-advisory-0112 • CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2025-0936 – On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly
https://notcve.org/view.php?id=CVE-2025-0936
07 May 2025 — On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly on other remote accounting servers (i.e. TACACS, RADIUS, etc). • https://www.arista.com/en/support/advisories-notices/security-advisory/21394-security-advisory-0117 • CWE-256: Plaintext Storage of a Password •

CVE-2025-2767 – Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2025-2767
25 Mar 2025 — Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the processing of the User-Agent HTTP header. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. • https://www.zerodayinitiative.com/advisories/ZDI-25-181 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-9135 – On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping.
https://notcve.org/view.php?id=CVE-2024-9135
04 Mar 2025 — On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping. • https://www.arista.com/en/support/advisories-notices/security-advisory/21092-security-advisory-0110 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2025-1260 – On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected.
https://notcve.org/view.php?id=CVE-2025-1260
04 Mar 2025 — On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in unexpected configuration/operations being applied to the switch. On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in unexpected configuration/operations being applied to the switch. • https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111 • CWE-284: Improper Access Control •

CVE-2025-1259 – On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected.
https://notcve.org/view.php?id=CVE-2025-1259
04 Mar 2025 — On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in users retrieving data that should not have been available On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in users retrieving data that should not have been available • https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111 • CWE-284: Improper Access Control •

CVE-2024-9188 – Specially constructed queries cause cross platform scripting leaking administrator tokens
https://notcve.org/view.php?id=CVE-2024-9188
10 Jan 2025 — Specially constructed queries cause cross platform scripting leaking administrator tokens • https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105 •

CVE-2024-47520 – A user with advanced report application access rights can perform actions for which they are not authorized
https://notcve.org/view.php?id=CVE-2024-47520
10 Jan 2025 — A user with advanced report application access rights can perform actions for which they are not authorized • https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105 • CWE-653: Improper Isolation or Compartmentalization •

CVE-2024-47519 – Backup uploads to ETM subject to man-in-the-middle interception
https://notcve.org/view.php?id=CVE-2024-47519
10 Jan 2025 — Backup uploads to ETM subject to man-in-the-middle interception • https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105 • CWE-322: Key Exchange without Entity Authentication •

CVE-2024-47518 – Specially constructed queries targeting ETM could discover active remote access sessions
https://notcve.org/view.php?id=CVE-2024-47518
10 Jan 2025 — Specially constructed queries targeting ETM could discover active remote access sessions • https://www.arista.com/en/support/advisories-notices/security-advisory/20454-security-advisory-0105 • CWE-552: Files or Directories Accessible to External Parties •