{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6188","assignerOrgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","state":"PUBLISHED","assignerShortName":"Arista","dateReserved":"2025-06-16T20:34:33.402Z","datePublished":"2025-08-25T20:14:23.427Z","dateUpdated":"2025-08-27T14:53:30.181Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["EOS"],"product":"EOS","vendor":"Arista Networks","versions":[{"lessThanOrEqual":"4.33.1F","status":"affected","version":"4.33.0","versionType":"custom"},{"lessThanOrEqual":"4.33.1.2F","status":"affected","version":"4.33.1.0","versionType":"custom"},{"lessThanOrEqual":"4.32.4.1M","status":"affected","version":"4.32.4.0","versionType":"custom"},{"lessThanOrEqual":"4.31.6M","status":"affected","version":"4.31.0","versionType":"custom"},{"lessThanOrEqual":"4.30.9.1M","status":"affected","version":"4.30.0","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">EOS devices are vulnerable to CVE-2025-6188 by default, and no specific configuration is necessary.</span><br>"}],"value":"EOS devices are vulnerable to CVE-2025-6188 by default, and no specific configuration is necessary."}],"credits":[{"lang":"en","type":"finder","value":"This issue was discovered externally and responsibly reported to Arista by Chris Laffin of automattic.com."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do not perform some form of authentication.</span><br>"}],"value":"On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do not perform some form of authentication."}],"impacts":[{"capecId":"CAPEC-486","descriptions":[{"lang":"en","value":"CAPEC-486 UDP Flood"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"288","lang":"en"}]}],"providerMetadata":{"orgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","shortName":"Arista","dateUpdated":"2025-08-25T20:14:23.427Z"},"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/22021-security-advisory-0121"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\">EOS User Manual: Upgrades and Downgrades</a></p><div>CVE-2025-6188 has been fixed in the following releases:</div><ul><li>4.34.0 and later releases in the 4.34.x train</li><li>4.33.2 and later releases in the 4.33.x train</li><li>4.32.5 and later releases in the 4.32.x train</li><li>4.31.7 and later releases in the 4.31.x train</li><li>4.30.10 and later releases in the 4.30.x train</li></ul>"}],"value":"The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see  EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \n\nCVE-2025-6188 has been fixed in the following releases:\n\n  *  4.34.0 and later releases in the 4.34.x train\n  *  4.33.2 and later releases in the 4.33.x train\n  *  4.32.5 and later releases in the 4.32.x train\n  *  4.31.7 and later releases in the 4.31.x train\n  *  4.30.10 and later releases in the 4.30.x train"}],"source":{"advisory":"121","defect":["BUG 1008073"],"discovery":"EXTERNAL"},"title":"On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS. UDP Port 3503 is associated with LspPing Echo Reply. This can result in unexpected behaviors, especially for UDP based services that do n","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>For EOS versions more recent than 4.28.1, if MPLS is not being used on the EOS device, a custom control plane ACL can be applied to remove the rules that allow traffic with source port 3503.</p><pre>Switch(config)#system control-plane\nSwitch(config-cp)#ip access-group my-custom-acl \n</pre><div>&nbsp;</div><p>For EOS versions more recent than 4.22.0, an ‘mpls ping’ service ACL can be applied to restrict traffic coming with source/destination port 3503. This service ACL is applicable on the traffic coming in with source/destination port 3503. MPLS configuration is not required to apply the ACL.</p><p>Take the following example, where the user applies service ACL ‘Foo’ that allows traffic from 10.0.0.0/8 with source port 3503 and denies everything else.</p><pre>Switch(config)#ip access-list Foo\nSwitch(config-acl-foo)#permit udp 10.0.0.0/8 eq lsp-ping any\nSwitch(config-acl-foo)#deny udp any eq lsp-ping any\n \nSwitch(config)#mpls ping\nSwitch(config-mpls-ping)#ip access-group foo in\n</pre><div>&nbsp;</div><p>If MPLS is not being used, it is fine to only have the deny rule in the ACL. For EOS versions older than 4.22.0 no mitigation exists.</p>"}],"value":"For EOS versions more recent than 4.28.1, if MPLS is not being used on the EOS device, a custom control plane ACL can be applied to remove the rules that allow traffic with source port 3503.\n\nSwitch(config)#system control-plane\nSwitch(config-cp)#ip access-group my-custom-acl \n\n\n \n\nFor EOS versions more recent than 4.22.0, an ‘mpls ping’ service ACL can be applied to restrict traffic coming with source/destination port 3503. This service ACL is applicable on the traffic coming in with source/destination port 3503. MPLS configuration is not required to apply the ACL.\n\nTake the following example, where the user applies service ACL ‘Foo’ that allows traffic from 10.0.0.0/8 with source port 3503 and denies everything else.\n\nSwitch(config)#ip access-list Foo\nSwitch(config-acl-foo)#permit udp 10.0.0.0/8 eq lsp-ping any\nSwitch(config-acl-foo)#deny udp any eq lsp-ping any\n \nSwitch(config)#mpls ping\nSwitch(config-mpls-ping)#ip access-group foo in\n\n\n \n\nIf MPLS is not being used, it is fine to only have the deny rule in the ACL. For EOS versions older than 4.22.0 no mitigation exists."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-290","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-26T19:56:57.303610Z","id":"CVE-2025-6188","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-27T14:53:30.181Z"}}]}}