{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8870","assignerOrgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","state":"PUBLISHED","assignerShortName":"Arista","dateReserved":"2025-08-11T18:15:44.614Z","datePublished":"2025-11-14T15:57:04.673Z","dateUpdated":"2025-11-14T16:29:13.516Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["710X Series"],"product":"EOS","vendor":"Arista Networks","versions":[{"status":"affected","version":"4.34.2FX","versionType":"custom"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b><p><span style=\"background-color: transparent;\">In order to be vulnerable to CVE-2025-8870, both of the following conditions must be met:</span></p><br><ol><li><p><span style=\"background-color: transparent;\">An attacker must have a serial interface connection to the device or access to remotely access the console via the console port. Network remote access does not cause this issue.</span></p></li></ol><p><span style=\"background-color: transparent;\">AND</span></p><ol><li><p><span style=\"background-color: transparent;\">Device must be using the Synopsys Designware serial model:</span></p></li></ol><br><div><table><tbody><tr><td><p><span style=\"background-color: transparent;\">#bash dmesg | grep \"Synopsys DesignWare\"</span></p><p><span style=\"background-color: transparent;\">[  &nbsp; 1.287358] 10200000.serial: ttyS0 at MMIO 0x10200000 (irq = 15, base_baud = 15625000) is a </span><span style=\"background-color: rgb(255, 255, 0);\">Synopsys DesignWare</span></p><p><span style=\"background-color: transparent;\">[  &nbsp; 1.287845] 10201000.serial: ttyS1 at MMIO 0x10201000 (irq = 164, base_baud = 15625000) is a Synopsys DesignWare</span></p></td></tr></tbody></table></div></b><br>"}],"value":"In order to be vulnerable to CVE-2025-8870, both of the following conditions must be met:\n\n\n  *  An attacker must have a serial interface connection to the device or access to remotely access the console via the console port. Network remote access does not cause this issue.\n\n\nAND\n\n  *  Device must be using the Synopsys Designware serial model:\n\n\n\n#bash dmesg | grep \"Synopsys DesignWare\"\n\n[    1.287358] 10200000.serial: ttyS0 at MMIO 0x10200000 (irq = 15, base_baud = 15625000) is a Synopsys DesignWare\n\n[    1.287845] 10201000.serial: ttyS1 at MMIO 0x10201000 (irq = 164, base_baud = 15625000) is a Synopsys DesignWare"}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:arista_networks:eos:4.34.2fx:*:710x_series:*:*:*:*:*","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"datePublic":"2025-11-11T14:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b><span style=\"background-color: transparent;\">On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153</span></b><br>"}],"value":"On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.153"}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"PHYSICAL","baseScore":5.6,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-248","description":"CWE-248","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c8b34d1a-69ae-45c3-88fe-f3b3d44f39b7","shortName":"Arista","dateUpdated":"2025-11-14T15:57:04.673Z"},"references":[{"url":"https://www.arista.com/en/support/advisories-notices/security-advisory/22811-security-advisory-0125"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b><p><span style=\"background-color: transparent;\">The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades\"><span style=\"background-color: transparent;\">EOS User Manual: Upgrades and Downgrades</span></a></p><br><p><span style=\"background-color: transparent;\">CVE-2025-8870 has been fixed in the following releases:</span></p><ul><li><p><span style=\"background-color: transparent;\">4.35.0F and later releases</span></p></li></ul></b><br>"}],"value":"The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see  EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades \n\n\nCVE-2025-8870 has been fixed in the following releases:\n\n  *  4.35.0F and later releases"}],"source":{"defect":["1206724"],"discovery":"INTERNAL"},"title":"On affected platforms running Arista EOS, certain serial console input might result in an unexpected reload of the device.","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b><span style=\"background-color: transparent;\">The mitigation is to limit access to the serial console.</span></b><br>"}],"value":"The mitigation is to limit access to the serial console."}],"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-14T16:28:58.202689Z","id":"CVE-2025-8870","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-14T16:29:13.516Z"}}]}}