First published: Wed May 07 2025(Updated: )
On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly on other remote accounting servers (i.e. TACACS, RADIUS, etc).
Credit: psirt@arista.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arista EOS |
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2025-0936 has been fixed in the following releases: * 4.30.10M and later releases in the 4.30.x train * 4.31.7M and later releases in the 4.31.x train * 4.32.5M and later releases in the 4.32.x train * 4.33.2F and later releases
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0936 is classified as a moderate severity vulnerability affecting Arista EOS.
To fix CVE-2025-0936, update your Arista EOS to the latest version that addresses this vulnerability.
The risks associated with CVE-2025-0936 include unintentional logging of remote server credentials which could lead to unauthorized access.
CVE-2025-0936 affects platforms running Arista EOS with gNMI transport enabled.
Yes, CVE-2025-0936 can potentially lead to the exposure of sensitive credentials if not mitigated.