CVE-2025-7048 (GCVE-0-2025-7048)
Vulnerability from cvelistv5 – Published: 2026-01-06 19:15 – Updated: 2026-01-06 19:44
VLAI?
Title
On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o
Summary
On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.
Severity ?
4.3 (Medium)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Arista Networks | EOS |
Affected:
4.34.3.0 , ≤ 4.34.3.1M
(custom)
Affected: 4.33.0 , ≤ 4.33.5M (custom) Affected: 4.32.0 , ≤ 4.32.7M (custom) Affected: 4.31.0 , ≤ 4.31.9M (custom) Affected: 0 , < 4.30.0 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7048",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-06T19:44:06.659074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-06T19:44:20.519Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"7500R/R2",
"7388-8D",
"7800/R3/R3A",
"722XPM",
"720XPM",
"750X",
"7050X3/X4",
"7170",
"7280R/R2/R3/R3A/R4",
"7289R3",
"cEOS-lab",
"vEOS-lab"
],
"product": "EOS",
"vendor": "Arista Networks",
"versions": [
{
"lessThanOrEqual": "4.34.3.1M",
"status": "affected",
"version": "4.34.3.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.33.5M",
"status": "affected",
"version": "4.33.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.32.7M",
"status": "affected",
"version": "4.32.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.31.9M",
"status": "affected",
"version": "4.31.0",
"versionType": "custom"
},
{
"lessThan": "4.30.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIn order to be vulnerable to CVE-2025-7048, the following condition must be met:\u003c/p\u003e\u003cp\u003eMACsec must be configured with valid keys:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\nInterface: EthernetX\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\n \nInterface: EthernetY\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cp\u003eIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\nswitch#\u003c/pre\u003e\u003cbr\u003e"
}
],
"value": "In order to be vulnerable to CVE-2025-7048, the following condition must be met:\n\nMACsec must be configured with valid keys:\n\nswitch#show mac security participants\nInterface: EthernetX\n\u00a0 \u00a0 CKN: \u003cckn\u003e\n\u00a0 \u00a0 \u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u00a0 \u00a0 \u00a0 Key management role: \u003ckey-server-role\u003e\n\u00a0 \u00a0 \u00a0 Success: \u003csuccess-status\u003e\n\u00a0 \u00a0 \u00a0 Principal: \u003cprincipal-status\u003e\n\u00a0 \u00a0 \u00a0 Key type: \u003ckey-type\u003e\n \nInterface: EthernetY\n\u00a0 \u00a0 CKN: \u003cckn\u003e\n\u00a0 \u00a0 \u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u00a0 \u00a0 \u00a0 Key management role: \u003ckey-server-role\u003e\n\u00a0 \u00a0 \u00a0 Success: \u003csuccess-status\u003e\n\u00a0 \u00a0 \u00a0 Principal: \u003cprincipal-status\u003e\n\u00a0 \u00a0 \u00a0 Key type: \u003ckey-type\u003e\n\n\n\u00a0\n\nIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\n\nswitch#show mac security participants\nswitch#"
}
],
"datePublic": "2025-12-30T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOn affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic."
}
],
"impacts": [
{
"capecId": "CAPEC-253",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-253 Remote Code Inclusion"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-805",
"description": "CWE-805",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-06T19:15:44.409Z",
"orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
"shortName": "Arista"
},
"references": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\u003cbr\u003eFor more information about upgrading see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\"\u003eEOS User Manual: Upgrades and Downgrades\u003c/a\u003e\u003c/p\u003e\u003cdiv\u003eCVE-2025-7048 has been fixed in the following releases:\u003c/div\u003e\u003cul\u003e\u003cli\u003e4.35.0F and later releases\u003c/li\u003e\u003cli\u003e4.34.4M and later releases in the 4.34.x train \u003c/li\u003e\u003cli\u003e4.33.6M and later releases in the 4.33.x train\u003c/li\u003e\u003cli\u003e4.32.8M and later releases in the 4.32.x train\u003c/li\u003e\u003cli\u003e4.31.10M and later releases in the 4.31.x train\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e"
}
],
"value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\nFor more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \n\nCVE-2025-7048 has been fixed in the following releases:\n\n * 4.35.0F and later releases\n * 4.34.4M and later releases in the 4.34.x train \n * 4.33.6M and later releases in the 4.33.x train\n * 4.32.8M and later releases in the 4.32.x train\n * 4.31.10M and later releases in the 4.31.x train"
}
],
"source": {
"advisory": "132",
"defect": [
"BUG1203696",
"BUG1153233"
],
"discovery": "INTERNAL"
},
"title": "On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "There is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue."
}
],
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
"assignerShortName": "Arista",
"cveId": "CVE-2025-7048",
"datePublished": "2026-01-06T19:15:44.409Z",
"dateReserved": "2025-07-03T15:30:22.152Z",
"dateUpdated": "2026-01-06T19:44:20.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-7048\",\"sourceIdentifier\":\"psirt@arista.com\",\"published\":\"2026-01-06T20:16:01.253\",\"lastModified\":\"2026-01-08T18:09:23.230\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@arista.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"psirt@arista.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"psirt@arista.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-805\"}]}],\"references\":[{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132\",\"source\":\"psirt@arista.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-7048\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-06T19:44:06.659074Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-06T19:39:24.827Z\"}}], \"cna\": {\"title\": \"On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o\", \"source\": {\"defect\": [\"BUG1203696\", \"BUG1153233\"], \"advisory\": \"132\", \"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-253\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-253 Remote Code Inclusion\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 5.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Arista Networks\", \"product\": \"EOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.34.3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.34.3.1M\"}, {\"status\": \"affected\", \"version\": \"4.33.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.33.5M\"}, {\"status\": \"affected\", \"version\": \"4.32.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.32.7M\"}, {\"status\": \"affected\", \"version\": \"4.31.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.31.9M\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.30.0\", \"versionType\": \"custom\"}], \"platforms\": [\"7500R/R2\", \"7388-8D\", \"7800/R3/R3A\", \"722XPM\", \"720XPM\", \"750X\", \"7050X3/X4\", \"7170\", \"7280R/R2/R3/R3A/R4\", \"7289R3\", \"cEOS-lab\", \"vEOS-lab\"], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\\nFor more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \\n\\nCVE-2025-7048 has been fixed in the following releases:\\n\\n * 4.35.0F and later releases\\n * 4.34.4M and later releases in the 4.34.x train \\n * 4.33.6M and later releases in the 4.33.x train\\n * 4.32.8M and later releases in the 4.32.x train\\n * 4.31.10M and later releases in the 4.31.x train\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\u003cbr\u003eFor more information about upgrading see \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\\\"\u003eEOS User Manual: Upgrades and Downgrades\u003c/a\u003e\u003c/p\u003e\u003cdiv\u003eCVE-2025-7048 has been fixed in the following releases:\u003c/div\u003e\u003cul\u003e\u003cli\u003e4.35.0F and later releases\u003c/li\u003e\u003cli\u003e4.34.4M and later releases in the 4.34.x train \u003c/li\u003e\u003cli\u003e4.33.6M and later releases in the 4.33.x train\u003c/li\u003e\u003cli\u003e4.32.8M and later releases in the 4.32.x train\u003c/li\u003e\u003cli\u003e4.31.10M and later releases in the 4.31.x train\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2025-12-30T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"There is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThere is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eOn affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-805\", \"description\": \"CWE-805\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"In order to be vulnerable to CVE-2025-7048, the following condition must be met:\\n\\nMACsec must be configured with valid keys:\\n\\nswitch#show mac security participants\\nInterface: EthernetX\\n\\u00a0 \\u00a0 CKN: \u003cckn\u003e\\n\\u00a0 \\u00a0 \\u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\\u00a0 \\u00a0 \\u00a0 Key management role: \u003ckey-server-role\u003e\\n\\u00a0 \\u00a0 \\u00a0 Success: \u003csuccess-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Principal: \u003cprincipal-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Key type: \u003ckey-type\u003e\\n \\nInterface: EthernetY\\n\\u00a0 \\u00a0 CKN: \u003cckn\u003e\\n\\u00a0 \\u00a0 \\u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\\u00a0 \\u00a0 \\u00a0 Key management role: \u003ckey-server-role\u003e\\n\\u00a0 \\u00a0 \\u00a0 Success: \u003csuccess-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Principal: \u003cprincipal-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Key type: \u003ckey-type\u003e\\n\\n\\n\\u00a0\\n\\nIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\\n\\nswitch#show mac security participants\\nswitch#\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIn order to be vulnerable to CVE-2025-7048, the following condition must be met:\u003c/p\u003e\u003cp\u003eMACsec must be configured with valid keys:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\\nInterface: EthernetX\\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\\n \\nInterface: EthernetY\\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cp\u003eIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\\nswitch#\u003c/pre\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7\", \"shortName\": \"Arista\", \"dateUpdated\": \"2026-01-06T19:15:44.409Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-7048\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-06T19:44:20.519Z\", \"dateReserved\": \"2025-07-03T15:30:22.152Z\", \"assignerOrgId\": \"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7\", \"datePublished\": \"2026-01-06T19:15:44.409Z\", \"assignerShortName\": \"Arista\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…