Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7048: CWE-805 in Arista Networks EOS

0
Medium
VulnerabilityCVE-2025-7048cvecve-2025-7048cwe-805
Published: Tue Jan 06 2026 (01/06/2026, 19:15:44 UTC)
Source: CVE Database V5
Vendor/Project: Arista Networks
Product: EOS

Description

On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.

AI-Powered Analysis

AILast updated: 01/06/2026, 19:41:35 UTC

Technical Analysis

CVE-2025-7048 is a vulnerability identified in Arista Networks EOS operating system, specifically impacting platforms configured with MACsec (Media Access Control Security). The vulnerability is classified under CWE-805, which relates to buffer access with incorrect length values, potentially leading to memory corruption or process termination. In this case, a specially crafted network packet can cause the MACsec process to terminate unexpectedly. MACsec is used to provide secure communication on Ethernet links by encrypting and authenticating data at Layer 2, so its disruption can impact the confidentiality and availability of network traffic. The vulnerability affects multiple EOS versions from 4.31.0 to 4.34.3.0. Exploitation requires no authentication or user interaction and can be performed remotely by sending malicious packets to the device. The CVSS v4.0 score is 5.3 (medium severity), reflecting the limited impact on confidentiality and integrity but a notable impact on availability due to potential dataplane disruption. Continuous receipt of these crafted packets can cause prolonged disruption of network traffic, impacting network stability and service availability. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. This vulnerability primarily threatens the availability of network infrastructure relying on MACsec on Arista EOS devices, which are commonly deployed in data centers and enterprise networks.

Potential Impact

For European organizations, this vulnerability poses a risk to the availability and stability of critical network infrastructure that uses Arista EOS with MACsec configurations. Disruption of the MACsec process can lead to loss of encrypted data flows, potentially causing network outages or degraded performance. This can affect data centers, cloud service providers, telecommunications operators, and enterprises relying on Arista EOS for secure Layer 2 connectivity. The impact is particularly significant for sectors requiring high network availability and security, such as finance, healthcare, government, and critical infrastructure. Prolonged disruption could lead to operational downtime, loss of productivity, and potential regulatory compliance issues related to data protection and network security. Although no known exploits are in the wild, the ease of exploitation (no authentication or user interaction required) means attackers could leverage this vulnerability in targeted denial-of-service attacks against European networks. Organizations with extensive Arista EOS deployments should prioritize detection and mitigation to maintain network resilience.

Mitigation Recommendations

1. Monitor network devices for unexpected MACsec process terminations or crashes, using centralized logging and network management tools to detect anomalies. 2. Implement network segmentation and access controls to limit exposure of Arista EOS devices to untrusted networks, reducing the attack surface. 3. Restrict and monitor traffic to MACsec-enabled interfaces, applying filtering rules to detect and block malformed or suspicious packets targeting MACsec. 4. Engage with Arista Networks support to obtain patches or firmware updates addressing CVE-2025-7048 as soon as they become available. 5. Conduct regular vulnerability assessments and penetration testing focused on network infrastructure to identify potential exploitation attempts. 6. Develop and test incident response plans specifically for network device failures and denial-of-service scenarios affecting MACsec. 7. Consider deploying redundant network paths and failover mechanisms to maintain availability in case of MACsec process disruption. 8. Keep device firmware and software up to date with the latest security releases beyond this vulnerability to reduce overall risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Arista
Date Reserved
2025-07-03T15:30:22.152Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d63fda7c70f178f8fbb19

Added to database: 1/6/2026, 7:35:25 PM

Last enriched: 1/6/2026, 7:41:35 PM

Last updated: 1/8/2026, 11:54:09 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats