Metrics
Affected Vendors & Products
No advisories yet.
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. Fixed versions are as follows for each product: Danz Monitoring Fabric * DMF 8.7.1 and later releases in the 8.7.x train * DMF 8.6.2 and later releases in the 8.6.x train * DMF 8.5.3 and later releases in the 8.5.x train * DMF 8.4.6 and later releases in the 8.4.x train. Converged Cloud Fabric * CCF 6.2.5 and later releases in the 6.2.x train Cloud Vision Appliance * CVA 7.1.0 and later releases in the CVA 7.x train Multi-Cloud Director * MCD 2.4.1 and later releases in the 2.4.x train
Workaround
No known mitigation
Wed, 29 Oct 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired | |
| Title | On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-10-29T22:45:53.499Z
Reserved: 2025-07-24T18:47:24.387Z
Link: CVE-2025-54547
No data.
Status : Received
Published: 2025-10-29T23:16:18.970
Modified: 2025-10-29T23:16:18.970
Link: CVE-2025-54547
No data.
OpenCVE Enrichment
No data.