On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153
Advisories

No advisories yet.

Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2025-8870 has been fixed in the following releases: * 4.35.0F and later releases


Workaround

The mitigation is to limit access to the serial console.

History

Sat, 15 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Arista
Arista eos
Vendors & Products Arista
Arista eos

Fri, 14 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Description On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153
Title On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.
Weaknesses CWE-248
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H'}

cvssV4_0

{'score': 5.6, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-11-14T16:29:13.516Z

Reserved: 2025-08-11T18:15:44.614Z

Link: CVE-2025-8870

cve-icon Vulnrichment

Updated: 2025-11-14T16:29:06.454Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-14T16:15:59.373

Modified: 2025-11-14T16:42:03.187

Link: CVE-2025-8870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-15T22:07:44Z