On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal anti-replay protection, will instead be forwarded due to this vulnerability.
Note: this issue does not affect VXLANSec or MACSec encryption functionality.
Metrics
Affected Vendors & Products
References
History
Wed, 28 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 27 May 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal anti-replay protection, will instead be forwarded due to this vulnerability. Note: this issue does not affect VXLANSec or MACSec encryption functionality. | |
Title | On affected platforms with hardware IPSec support running Arista EOS with IPsec enabled and anti-replay protection configured, EOS may exhibit unexpected behavior in specific cases. Received duplicate encrypted packets, which should be dropped under normal | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-05-28T13:34:30.912Z
Reserved: 2025-03-25T16:27:53.397Z
Link: CVE-2025-2796

Updated: 2025-05-28T13:34:27.510Z

Status : Awaiting Analysis
Published: 2025-05-27T23:15:21.283
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-2796

No data.

No data.