On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired
Advisories

No advisories yet.

Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. Fixed versions are as follows for each product:   Danz Monitoring Fabric * DMF 8.7.1 and later releases in the 8.7.x train * DMF 8.6.2 and later releases in the 8.6.x train * DMF 8.5.3 and later releases in the 8.5.x train * DMF 8.4.6 and later releases in the 8.4.x train.   Converged Cloud Fabric * CCF 6.2.5 and later releases in the 6.2.x train   Cloud Vision Appliance * CVA 7.1.0 and later releases in the CVA 7.x train   Multi-Cloud Director * MCD 2.4.1 and later releases in the 2.4.x train


Workaround

No known mitigation

History

Thu, 30 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Arista
Arista danz Monitoring Fabric
Vendors & Products Arista
Arista danz Monitoring Fabric

Wed, 29 Oct 2025 23:00:00 +0000

Type Values Removed Values Added
Description On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired
Title On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-10-30T14:15:29.632Z

Reserved: 2025-07-24T18:47:24.387Z

Link: CVE-2025-54547

cve-icon Vulnrichment

Updated: 2025-10-30T14:15:22.068Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T23:16:18.970

Modified: 2025-10-30T15:15:39.540

Link: CVE-2025-54547

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T14:37:51Z

Weaknesses