On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being delivered to unexpected destinations.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-14045 On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being delivered to unexpected destinations.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2024-9448 has been fixed in the following releases: * 4.33.1F and later releases in the 4.33.x train * 4.32.4M and later releases in the 4.32.x train * 4.31.6M and later releases in the 4.31.x train * 4.30.9M and later releases in the 4.30.x train


Workaround

There is no mitigation other than to not use the Traffic Policy feature where it would be expected to match on receipt of untagged packets.

History

Mon, 25 Aug 2025 21:45:00 +0000


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00055}

epss

{'score': 0.00064}


Thu, 08 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 May 2025 19:30:00 +0000

Type Values Removed Values Added
Description On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being delivered to unexpected destinations.
Title On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropp
Weaknesses CWE-1284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-08-25T19:52:14.674Z

Reserved: 2024-10-02T20:39:01.319Z

Link: CVE-2024-9448

cve-icon Vulnrichment

Updated: 2025-05-08T19:29:42.365Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-08T20:15:28.753

Modified: 2025-05-12T17:32:52.810

Link: CVE-2024-9448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-16T21:35:35Z