Cyber Posture

CVE-2025-1260

Critical

Published: 04 March 2025

Published
04 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0009 26.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Security Summary

CVE-2025-1260 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) affecting Arista EOS platforms with OpenConfig configured. It stems from improper access control (CWE-284), allowing a gNOI request to execute when it should be rejected. This flaw enables unexpected configurations or operations to be applied to the switch, potentially compromising its integrity and functionality. The vulnerability was published on 2025-03-04.

Exploitation requires high privileges (PR:H) and can be performed remotely over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). A privileged attacker could send a crafted gNOI request that bypasses intended restrictions, leading to scope expansion (S:C) and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation could allow arbitrary configuration changes or operational disruptions on the affected switch.

Arista has issued a security advisory at https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111, which provides details on the vulnerability and recommended mitigations. Security practitioners should consult this advisory for patch information and workaround guidance specific to affected EOS versions.

Details

CWE(s)
CWE-284

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability is an improper access control flaw in the gNOI remote management service on Arista EOS, allowing a privileged remote attacker to bypass restrictions and apply unauthorized configurations/operations. This directly maps to exploitation of a remote service vulnerability.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References