SB20260415103 - Multiple vulnerabilities in Arista EOS



SB20260415103 - Multiple vulnerabilities in Arista EOS

Published: April 15, 2026

Security Bulletin ID SB20260415103
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper privilege management (CVE-ID: CVE-2025-5088)

The vulnerability allows a remote user to obtain full root access to all servers in the CVX cluster.

The vulnerability exists due to improper privilege management in the MCS Redis service when handling an authenticated Redis session. A remote user can use an authenticated Redis session to obtain full root access to all servers in the CVX cluster.

Only systems with the MCS service enabled are vulnerable, and Redis communication including authentication occurs over plaintext.


2) Improper input validation (CVE-ID: CVE-2025-5089)

The vulnerability allows a remote user to cause a denial of service.

The vulnerability exists due to improper input validation in the Sysdb agent when processing malformed messages from a connected CVX server or connected EOS switch. A remote user can send specially crafted TCP packets to cause a denial of service.

Only systems with CVX enabled are vulnerable, and EOS switches not connected to a CVX server are not impacted.


3) Improper input validation (CVE-ID: CVE-2025-5090)

The vulnerability allows a remote user to cause a denial of service.

The vulnerability exists due to improper input validation in CVX when processing unexpected messages from a connected switch. A remote user can send custom TCP packets to cause a denial of service.

Only systems with CVX enabled are vulnerable.


Remediation

Install update from vendor's website.