Metrics
Affected Vendors & Products
No advisories yet.
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2025-7048 has been fixed in the following releases: * 4.35.0F and later releases * 4.34.4M and later releases in the 4.34.x train * 4.33.6M and later releases in the 4.33.x train * 4.32.8M and later releases in the 4.32.x train * 4.31.10M and later releases in the 4.31.x train
Workaround
There is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.
Wed, 07 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arista
Arista eos |
|
| Vendors & Products |
Arista
Arista eos |
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic. | |
| Title | On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o | |
| Weaknesses | CWE-805 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2026-01-06T19:44:20.519Z
Reserved: 2025-07-03T15:30:22.152Z
Link: CVE-2025-7048
Updated: 2026-01-06T19:39:24.827Z
Status : Awaiting Analysis
Published: 2026-01-06T20:16:01.253
Modified: 2026-01-08T18:09:23.230
Link: CVE-2025-7048
No data.
OpenCVE Enrichment
Updated: 2026-01-07T10:08:26Z