Metrics
Affected Vendors & Products
No advisories yet.
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2025-8870 has been fixed in the following releases: * 4.35.0F and later releases
Workaround
The mitigation is to limit access to the serial console.
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arista
Arista eos |
|
| Vendors & Products |
Arista
Arista eos |
Fri, 14 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153 | |
| Title | On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device. | |
| Weaknesses | CWE-248 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-11-14T16:29:13.516Z
Reserved: 2025-08-11T18:15:44.614Z
Link: CVE-2025-8870
Updated: 2025-11-14T16:29:06.454Z
Status : Awaiting Analysis
Published: 2025-11-14T16:15:59.373
Modified: 2025-11-14T16:42:03.187
Link: CVE-2025-8870
No data.
OpenCVE Enrichment
Updated: 2025-11-15T22:07:44Z