On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal anti-replay protection, will instead be forwarded due to this vulnerability.
Note: this issue does not affect VXLANSec or MACSec encryption functionality.
Metrics
Affected Vendors & Products
References
History
Wed, 28 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 May 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal anti-replay protection, will instead be forwarded due to this vulnerability. Note: this issue does not affect VXLANSec or MACSec encryption functionality. | |
| Title | On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-05-28T13:34:30.912Z
Reserved: 2025-03-25T16:27:53.397Z
Link: CVE-2025-2796
Updated: 2025-05-28T13:34:27.510Z
Status : Awaiting Analysis
Published: 2025-05-27T23:15:21.283
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-2796
No data.
OpenCVE Enrichment
No data.