CVE-2025-7048 (GCVE-0-2025-7048)
Vulnerability from cvelistv5
Published
2026-01-06 19:15
Modified
2026-01-06 19:44
Severity ?
5.3 (Medium) - CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
VLAI Severity ?
EPSS score ?
CWE
Summary
On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Arista Networks | EOS |
Version: 4.34.3.0 < Version: 4.33.0 < Version: 4.32.0 < Version: 4.31.0 < Version: 0 < 4.30.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7048",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-06T19:44:06.659074Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-06T19:44:20.519Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"7500R/R2",
"7388-8D",
"7800/R3/R3A",
"722XPM",
"720XPM",
"750X",
"7050X3/X4",
"7170",
"7280R/R2/R3/R3A/R4",
"7289R3",
"cEOS-lab",
"vEOS-lab"
],
"product": "EOS",
"vendor": "Arista Networks",
"versions": [
{
"lessThanOrEqual": "4.34.3.1M",
"status": "affected",
"version": "4.34.3.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.33.5M",
"status": "affected",
"version": "4.33.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.32.7M",
"status": "affected",
"version": "4.32.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.31.9M",
"status": "affected",
"version": "4.31.0",
"versionType": "custom"
},
{
"lessThan": "4.30.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIn order to be vulnerable to CVE-2025-7048, the following condition must be met:\u003c/p\u003e\u003cp\u003eMACsec must be configured with valid keys:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\nInterface: EthernetX\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\n \nInterface: EthernetY\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cp\u003eIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\nswitch#\u003c/pre\u003e\u003cbr\u003e"
}
],
"value": "In order to be vulnerable to CVE-2025-7048, the following condition must be met:\n\nMACsec must be configured with valid keys:\n\nswitch#show mac security participants\nInterface: EthernetX\n\u00a0 \u00a0 CKN: \u003cckn\u003e\n\u00a0 \u00a0 \u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u00a0 \u00a0 \u00a0 Key management role: \u003ckey-server-role\u003e\n\u00a0 \u00a0 \u00a0 Success: \u003csuccess-status\u003e\n\u00a0 \u00a0 \u00a0 Principal: \u003cprincipal-status\u003e\n\u00a0 \u00a0 \u00a0 Key type: \u003ckey-type\u003e\n \nInterface: EthernetY\n\u00a0 \u00a0 CKN: \u003cckn\u003e\n\u00a0 \u00a0 \u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\n\u00a0 \u00a0 \u00a0 Key management role: \u003ckey-server-role\u003e\n\u00a0 \u00a0 \u00a0 Success: \u003csuccess-status\u003e\n\u00a0 \u00a0 \u00a0 Principal: \u003cprincipal-status\u003e\n\u00a0 \u00a0 \u00a0 Key type: \u003ckey-type\u003e\n\n\n\u00a0\n\nIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\n\nswitch#show mac security participants\nswitch#"
}
],
"datePublic": "2025-12-30T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eOn affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic."
}
],
"impacts": [
{
"capecId": "CAPEC-253",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-253 Remote Code Inclusion"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-805",
"description": "CWE-805",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-06T19:15:44.409Z",
"orgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
"shortName": "Arista"
},
"references": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\u003cbr\u003eFor more information about upgrading see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\"\u003eEOS User Manual: Upgrades and Downgrades\u003c/a\u003e\u003c/p\u003e\u003cdiv\u003eCVE-2025-7048 has been fixed in the following releases:\u003c/div\u003e\u003cul\u003e\u003cli\u003e4.35.0F and later releases\u003c/li\u003e\u003cli\u003e4.34.4M and later releases in the 4.34.x train \u003c/li\u003e\u003cli\u003e4.33.6M and later releases in the 4.33.x train\u003c/li\u003e\u003cli\u003e4.32.8M and later releases in the 4.32.x train\u003c/li\u003e\u003cli\u003e4.31.10M and later releases in the 4.31.x train\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e"
}
],
"value": "The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\nFor more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \n\nCVE-2025-7048 has been fixed in the following releases:\n\n * 4.35.0F and later releases\n * 4.34.4M and later releases in the 4.34.x train \n * 4.33.6M and later releases in the 4.33.x train\n * 4.32.8M and later releases in the 4.32.x train\n * 4.31.10M and later releases in the 4.31.x train"
}
],
"source": {
"advisory": "132",
"defect": [
"BUG1203696",
"BUG1153233"
],
"discovery": "INTERNAL"
},
"title": "On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "There is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue."
}
],
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7",
"assignerShortName": "Arista",
"cveId": "CVE-2025-7048",
"datePublished": "2026-01-06T19:15:44.409Z",
"dateReserved": "2025-07-03T15:30:22.152Z",
"dateUpdated": "2026-01-06T19:44:20.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-7048\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-01-06T19:44:06.659074Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-01-06T19:39:24.827Z\"}}], \"cna\": {\"title\": \"On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption o\", \"source\": {\"defect\": [\"BUG1203696\", \"BUG1153233\"], \"advisory\": \"132\", \"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-253\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-253 Remote Code Inclusion\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 5.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Arista Networks\", \"product\": \"EOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.34.3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.34.3.1M\"}, {\"status\": \"affected\", \"version\": \"4.33.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.33.5M\"}, {\"status\": \"affected\", \"version\": \"4.32.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.32.7M\"}, {\"status\": \"affected\", \"version\": \"4.31.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.31.9M\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.30.0\", \"versionType\": \"custom\"}], \"platforms\": [\"7500R/R2\", \"7388-8D\", \"7800/R3/R3A\", \"722XPM\", \"720XPM\", \"750X\", \"7050X3/X4\", \"7170\", \"7280R/R2/R3/R3A/R4\", \"7289R3\", \"cEOS-lab\", \"vEOS-lab\"], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\\nFor more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \\n\\nCVE-2025-7048 has been fixed in the following releases:\\n\\n * 4.35.0F and later releases\\n * 4.34.4M and later releases in the 4.34.x train \\n * 4.33.6M and later releases in the 4.33.x train\\n * 4.32.8M and later releases in the 4.32.x train\\n * 4.31.10M and later releases in the 4.31.x train\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below.\u003cbr\u003eFor more information about upgrading see \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\\\"\u003eEOS User Manual: Upgrades and Downgrades\u003c/a\u003e\u003c/p\u003e\u003cdiv\u003eCVE-2025-7048 has been fixed in the following releases:\u003c/div\u003e\u003cul\u003e\u003cli\u003e4.35.0F and later releases\u003c/li\u003e\u003cli\u003e4.34.4M and later releases in the 4.34.x train \u003c/li\u003e\u003cli\u003e4.33.6M and later releases in the 4.33.x train\u003c/li\u003e\u003cli\u003e4.32.8M and later releases in the 4.32.x train\u003c/li\u003e\u003cli\u003e4.31.10M and later releases in the 4.31.x train\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2025-12-30T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisory/23120-security-advisory-0132\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"There is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThere is no known work around to keep MACsec running and make it not susceptible to the security issue. MACsec would need to be disabled to eliminate the issue.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"On affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eOn affected platforms running Arista EOS with MACsec configuration, a specially crafted packet can cause the MACsec process to terminate unexpectedly. Continuous receipt of these packets with certain MACsec configurations can cause longer term disruption of dataplane traffic.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-805\", \"description\": \"CWE-805\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"In order to be vulnerable to CVE-2025-7048, the following condition must be met:\\n\\nMACsec must be configured with valid keys:\\n\\nswitch#show mac security participants\\nInterface: EthernetX\\n\\u00a0 \\u00a0 CKN: \u003cckn\u003e\\n\\u00a0 \\u00a0 \\u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\\u00a0 \\u00a0 \\u00a0 Key management role: \u003ckey-server-role\u003e\\n\\u00a0 \\u00a0 \\u00a0 Success: \u003csuccess-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Principal: \u003cprincipal-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Key type: \u003ckey-type\u003e\\n \\nInterface: EthernetY\\n\\u00a0 \\u00a0 CKN: \u003cckn\u003e\\n\\u00a0 \\u00a0 \\u00a0 Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\\u00a0 \\u00a0 \\u00a0 Key management role: \u003ckey-server-role\u003e\\n\\u00a0 \\u00a0 \\u00a0 Success: \u003csuccess-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Principal: \u003cprincipal-status\u003e\\n\\u00a0 \\u00a0 \\u00a0 Key type: \u003ckey-type\u003e\\n\\n\\n\\u00a0\\n\\nIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\\n\\nswitch#show mac security participants\\nswitch#\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIn order to be vulnerable to CVE-2025-7048, the following condition must be met:\u003c/p\u003e\u003cp\u003eMACsec must be configured with valid keys:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\\nInterface: EthernetX\\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\\n \\nInterface: EthernetY\\n\u0026nbsp; \u0026nbsp; CKN: \u0026lt;ckn\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Member ID: xxxxxxxxxxxxxxxxxxxxxxxx\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key management role: \u0026lt;key-server-role\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Success: \u0026lt;success-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Principal: \u0026lt;principal-status\u0026gt;\\n\u0026nbsp; \u0026nbsp; \u0026nbsp; Key type: \u0026lt;key-type\u0026gt;\\n\u003c/pre\u003e\u003cdiv\u003e\u0026nbsp;\u003c/div\u003e\u003cp\u003eIf MACsec with valid key is not configured there is no exposure to this issue and this command will not show any output:\u003c/p\u003e\u003cpre\u003eswitch#show mac security participants\\nswitch#\u003c/pre\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7\", \"shortName\": \"Arista\", \"dateUpdated\": \"2026-01-06T19:15:44.409Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-7048\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-06T19:44:20.519Z\", \"dateReserved\": \"2025-07-03T15:30:22.152Z\", \"assignerOrgId\": \"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7\", \"datePublished\": \"2026-01-06T19:15:44.409Z\", \"assignerShortName\": \"Arista\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…