Metrics
Affected Vendors & Products
No advisories yet.
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. Fixed versions are as follows for each product: Danz Monitoring Fabric * DMF 8.7.1 and later releases in the 8.7.x train * DMF 8.6.2 and later releases in the 8.6.x train * DMF 8.5.3 and later releases in the 8.5.x train * DMF 8.4.6 and later releases in the 8.4.x train. Converged Cloud Fabric * CCF 6.2.5 and later releases in the 6.2.x train Cloud Vision Appliance * CVA 7.1.0 and later releases in the CVA 7.x train Multi-Cloud Director * MCD 2.4.1 and later releases in the 2.4.x train
Workaround
A downloaded upgrade image can be manually checked against the hash values published on arista.com https://www.arista.com/support/software-download . If the published hash values do not match those of the image this is a potential indicator of compromise.
Thu, 30 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arista
Arista danz Monitoring Fabric |
|
| Vendors & Products |
Arista
Arista danz Monitoring Fabric |
Wed, 29 Oct 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO | |
| Title | Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-10-30T14:12:59.838Z
Reserved: 2025-07-24T18:47:24.387Z
Link: CVE-2025-54549
Updated: 2025-10-30T14:12:54.368Z
Status : Awaiting Analysis
Published: 2025-10-29T23:16:19.227
Modified: 2025-10-30T15:03:13.440
Link: CVE-2025-54549
No data.
OpenCVE Enrichment
Updated: 2025-10-30T14:37:37Z