On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes)
Advisories

No advisories yet.

Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. Fixed versions are as follows for each product:   Danz Monitoring Fabric * DMF 8.7.1 and later releases in the 8.7.x train * DMF 8.6.2 and later releases in the 8.6.x train * DMF 8.5.3 and later releases in the 8.5.x train * DMF 8.4.6 and later releases in the 8.4.x train.   Converged Cloud Fabric * CCF 6.2.5 and later releases in the 6.2.x train   Cloud Vision Appliance * CVA 7.1.0 and later releases in the CVA 7.x train   Multi-Cloud Director * MCD 2.4.1 and later releases in the 2.4.x train


Workaround

Disable any restricted users until an upgraded version can be installed.

History

Thu, 30 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Arista
Arista danz Monitoring Fabric
Vendors & Products Arista
Arista danz Monitoring Fabric

Wed, 29 Oct 2025 23:00:00 +0000

Type Values Removed Values Added
Description On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes)
Title On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes)
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-10-30T14:15:49.212Z

Reserved: 2025-07-24T18:47:24.387Z

Link: CVE-2025-54548

cve-icon Vulnrichment

Updated: 2025-10-30T14:15:45.532Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T23:16:19.100

Modified: 2025-10-30T15:03:13.440

Link: CVE-2025-54548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T14:37:28Z

Weaknesses