Arista Networks EOS Buffer Overflow (SA0132)

medium Nessus Plugin ID 282504

Synopsis

The version of Arista Networks EOS running on the remote device is affected by a buffer overflow vulnerability.

Description

On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the patch or upgrade to a fixed version as referenced in the vendor advisory.

See Also

http://www.nessus.org/u?33dc7d46

Plugin Details

Severity: Medium

ID: 282504

File Name: arista_eos_sa0132.nasl

Version: 1.1

Type: combined

Family: Misc.

Published: 1/9/2026

Updated: 1/9/2026

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 3.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2025-7048

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:arista:eos

Required KB Items: Settings/ParanoidReport, Host/Arista-EOS/Version, Host/Arista-EOS/model

Patch Publication Date: 12/30/2025

Vulnerability Publication Date: 12/30/2025

Reference Information

CVE: CVE-2025-7048

IAVA: 2026-A-0002