CVE-2025-0936

6.5 MEDIUM

📋 TL;DR

Arista EOS devices with gNMI transport enabled may log or transmit remote server credentials when using the gNOI File TransferToRemote RPC. This affects organizations using Arista networking equipment with gNMI enabled for remote file transfers. The vulnerability exposes credentials that could be used for further attacks.

💻 Affected Systems

Products:
  • Arista EOS
Versions: All versions prior to the fixed releases
Operating Systems: Arista EOS
Default Config Vulnerable: ✅ No
Notes: Only affects systems with gNMI transport enabled and using gNOI File TransferToRemote RPC with remote server credentials.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to remote server credentials, potentially compromising external systems, performing lateral movement, or accessing sensitive data on remote servers.

🟠

Likely Case

Credentials are exposed in logs accessible to administrators or monitoring systems, potentially leading to credential misuse if logs are not properly secured.

🟢

If Mitigated

With proper log security and access controls, credential exposure is limited to authorized personnel only, reducing the risk of misuse.

🌐 Internet-Facing: MEDIUM - Requires gNMI transport enabled and access to execute the RPC, but internet-facing devices increase attack surface.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to gain credentials for external systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to execute the gNOI RPC and knowledge of the vulnerability. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Arista security advisory for specific fixed versions

Vendor Advisory: https://www.arista.com/en/support/advisories-notices/security-advisory/21394-security-advisory-0117

Restart Required: Yes

Instructions:

1. Review Arista security advisory 21394. 2. Identify affected EOS versions. 3. Upgrade to fixed EOS version. 4. Restart affected devices.

🔧 Temporary Workarounds

Disable gNMI transport

all

Disable gNMI transport if not required for operations

no management api gnmi

Restrict gNOI RPC access

all

Limit access to gNOI RPCs to trusted users only

management api gnmi
   transport grpc default
   no shutdown
   vrf management
   ip access-group ACL-NAME in

🧯 If You Can't Patch

  • Implement strict access controls for gNMI/gNOI interfaces
  • Monitor and secure logs containing credential information

🔍 How to Verify

Check if Vulnerable:

Check if gNMI is enabled and EOS version is vulnerable: show management api gnmi

Check Version:

show version | include Software image version

Verify Fix Applied:

Verify EOS version is patched: show version | include Software image version

📡 Detection & Monitoring

Log Indicators:

  • gNOI File TransferToRemote RPC executions in system logs
  • Credential strings appearing in unexpected log locations

Network Indicators:

  • Unusual gNMI/gNOI traffic patterns
  • Multiple failed authentication attempts following gNOI operations

SIEM Query:

source="arista-eos" AND ("TransferToRemote" OR "gNOI")

🔗 References

📤 Share & Export