On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-config could then be used to obtain protocol specific passwords in cases where symmetric passwords are required between devices with neighbor protocol relationships.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Aug 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Arista
Arista eos |
|
Vendors & Products |
Arista
Arista eos |
Mon, 25 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-config could then be used to obtain protocol specific passwords in cases where symmetric passwords are required between devices with neighbor protocol relationships. | |
Title | On affected platforms running Arista EOS, the global common encryption key configuration may be logged in clear text, in local or remote accounting logs. Knowledge of both the encryption key and protocol specific encrypted secrets from the device running-c | |
Weaknesses | CWE-532 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Arista
Published: 2025-08-25T20:02:48.722Z
Updated: 2025-08-25T20:31:54.730Z
Reserved: 2025-04-08T21:38:05.413Z
Link: CVE-2025-3456

Updated: 2025-08-25T20:22:46.098Z

Status : Awaiting Analysis
Published: 2025-08-25T20:15:39.907
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-3456

No data.