Cyber Posture

CVE-2025-1259

High

Published: 04 March 2025

Published
04 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0015 34.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may access network configuration files to collect sensitive data about the device and the network.

Security Summary

CVE-2025-1259 affects Arista EOS platforms with OpenConfig configured, where a gNOI request can be executed even when it should be rejected. This improper access control vulnerability, classified under CWE-284, enables users to retrieve data that is not intended to be available to them. The issue carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N), highlighting high confidentiality impact with network accessibility and low attack complexity.

Exploitation requires low privileges (PR:L) over the network without user interaction. A malicious authenticated user can send a gNOI request that circumvents rejection logic, achieving scoped high-impact unauthorized data disclosure from the affected EOS instance.

Arista has issued a security advisory providing details on mitigations and patches at https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111. Security practitioners should consult this for specific remediation steps.

Details

CWE(s)
CWE-284

MITRE ATT&CK Enterprise Techniques

T1602.002 Network Device Configuration Dump Collection
Adversaries may access network configuration files to collect sensitive data about the device and the network.
Why these techniques?

Improper access control in gNOI allows low-priv authenticated users to bypass rejection logic and retrieve unauthorized data from the network device, directly enabling network device configuration/state data collection.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References