CVE-2025-1259
Published: 04 March 2025
Description
Adversaries may access network configuration files to collect sensitive data about the device and the network.
Security Summary
CVE-2025-1259 affects Arista EOS platforms with OpenConfig configured, where a gNOI request can be executed even when it should be rejected. This improper access control vulnerability, classified under CWE-284, enables users to retrieve data that is not intended to be available to them. The issue carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N), highlighting high confidentiality impact with network accessibility and low attack complexity.
Exploitation requires low privileges (PR:L) over the network without user interaction. A malicious authenticated user can send a gNOI request that circumvents rejection logic, achieving scoped high-impact unauthorized data disclosure from the affected EOS instance.
Arista has issued a security advisory providing details on mitigations and patches at https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111. Security practitioners should consult this for specific remediation steps.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Improper access control in gNOI allows low-priv authenticated users to bypass rejection logic and retrieve unauthorized data from the network device, directly enabling network device configuration/state data collection.