This issue was discovered internally by Arista and is not aware of any malicious uses of this issue in customer networks.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see: EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2025-8872 has been fixed in the following releases: * 4.34.2F and later releases in the 4.34.x train * 4.33.5M and later releases in the 4.33.x train * 4.32.8M and later releases in the 4.32.x train * 4.31.9M and later releases in the 4.31.x train
Workaround
There is no workaround to mitigate the issue.
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted. This may cause disruption in the OSFPv3 routes on the switch. This issue was discovered internally by Arista and is not aware of any malicious uses of this issue in customer networks. | |
| Title | A specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-12-16T19:51:10.033Z
Reserved: 2025-08-11T18:18:36.004Z
Link: CVE-2025-8872
Updated: 2025-12-16T19:50:58.766Z
Status : Received
Published: 2025-12-16T20:15:49.460
Modified: 2025-12-16T20:15:49.460
Link: CVE-2025-8872
No data.
OpenCVE Enrichment
No data.