Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

arista

About This Vendor

arista is a technology vendor producing software and infrastructure products. As a prominent networking and security infrastructure vendor, arista's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of arista's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 94 known vulnerabilities from arista. This includes 12 critical-severity issues and 37 high-severity issues that represent significant risk. These vulnerabilities affect 903 distinct products across arista's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2014 through 2025, indicating decades of continuous security attention and research. Organizations deploying arista products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-6271 2014-09-24 2025-10-22 9.8 10.0 Likely
CVE-2014-7169 2014-09-25 2025-10-22 9.8 10.0 Likely
CVE-2015-3209 2015-06-15 2025-04-12 - 7.5 Likely
CVE-2015-5165 2015-08-12 2025-04-12 - 9.3 Likely
CVE-2015-3214 2015-08-31 2025-04-12 - 6.9 Unknown
CVE-2015-6855 2015-11-06 2025-04-12 7.5 5.0 Likely
CVE-2015-8236 2015-11-19 2025-04-12 - 10.0 Likely
CVE-2016-6894 2017-01-04 2025-04-12 7.5 7.8 Likely
CVE-2016-9012 2017-01-23 2025-04-20 8.8 6.5 Likely
CVE-2017-14491 2017-10-04 2025-04-20 9.8 7.5 Likely
CVE-2017-18017 2018-01-03 2025-01-03 9.8 10.0 Likely
CVE-2018-5255 2018-03-05 2024-11-21 6.5 4.0 Likely
CVE-2018-5254 2018-04-12 2024-11-21 7.5 5.0 Likely
CVE-2018-12357 2019-08-15 2024-11-21 6.5 4.0 Likely
CVE-2018-14008 2019-08-15 2024-11-21 6.5 3.3 Unknown
CVE-2019-14810 2019-10-10 2024-11-21 5.9 4.3 Likely
CVE-2019-17596 2019-10-24 2024-11-21 7.5 5.0 Likely
CVE-2019-18615 2019-12-19 2024-11-21 4.9 3.5 Unknown
CVE-2019-18181 2019-12-19 2024-11-21 7.8 4.6 Unknown
CVE-2015-5239 2020-01-23 2024-11-21 6.5 4.0 Likely
CVE-2015-5278 2020-01-23 2024-11-21 6.5 4.0 Likely
CVE-2015-5745 2020-01-23 2024-11-21 6.5 4.0 Likely
CVE-2015-6815 2020-01-31 2024-11-21 3.5 2.7 Unknown
CVE-2020-9015 2020-02-20 2024-11-21 9.8 7.5 Likely
CVE-2020-10188 2020-03-06 2026-01-21 9.8 10.0 Likely
CVE-2019-18948 2020-04-16 2024-11-21 7.5 5.0 Likely
CVE-2020-13881 2020-06-06 2024-11-21 7.5 4.3 Likely
CVE-2020-11622 2020-06-10 2024-11-21 7.5 4.3 Likely
CVE-2020-3702 2020-09-08 2024-11-21 6.5 3.3 Unknown
CVE-2020-24333 2020-09-22 2024-11-21 6.5 4.0 Likely
CVE-2020-17355 2020-10-21 2024-11-21 7.5 4.3 Likely
CVE-2020-13100 2020-10-26 2024-11-21 7.5 5.0 Likely
CVE-2020-15897 2020-10-26 2024-11-21 7.5 5.0 Likely
CVE-2020-26569 2020-12-28 2024-11-21 5.9 4.3 Likely
CVE-2020-15898 2020-12-28 2024-11-21 5.3 5.0 Likely
CVE-2020-24360 2020-12-28 2024-11-21 7.4 6.1 Unknown
CVE-2020-25684 2021-01-20 2025-11-04 3.7 4.3 Likely
CVE-2020-25685 2021-01-20 2025-11-04 3.7 4.3 Likely
CVE-2020-25686 2021-01-20 2025-11-04 3.7 4.3 Likely
CVE-2020-24586 2021-05-11 2024-11-21 3.5 2.9 Unknown
CVE-2020-24587 2021-05-11 2024-11-21 2.6 1.8 Unknown
CVE-2020-24588 2021-05-11 2024-11-21 3.5 2.9 Unknown
CVE-2020-26139 2021-05-11 2024-11-21 5.3 2.9 Unknown
CVE-2020-26140 2021-05-11 2024-11-21 6.5 3.3 Unknown
CVE-2020-26143 2021-05-11 2024-11-21 6.5 3.3 Unknown
CVE-2020-26144 2021-05-11 2024-11-21 6.5 3.3 Unknown
CVE-2020-26146 2021-05-11 2024-11-21 5.3 2.9 Unknown
CVE-2020-26147 2021-05-11 2024-11-21 5.4 3.2 Unknown
CVE-2021-28493 2021-09-09 2024-11-21 8.4 4.6 Unknown
CVE-2021-28494 2021-09-09 2024-11-21 9.6 6.5 Likely
CVE-2021-28495 2021-09-09 2024-11-21 7.2 6.8 Likely
CVE-2021-28497 2021-09-09 2024-11-21 4.4 4.6 Unknown
CVE-2021-28498 2021-09-09 2024-11-21 8.7 7.2 Unknown
CVE-2021-28499 2021-09-09 2024-11-21 6.3 2.1 Unknown
CVE-2021-28496 2021-10-21 2024-11-21 5.7 4.0 Likely
CVE-2021-28500 2022-01-14 2024-11-21 9.1 6.9 Unknown
CVE-2021-28501 2022-01-14 2024-11-21 9.1 6.9 Unknown
CVE-2021-28506 2022-01-14 2024-11-21 9.1 9.4 Likely
CVE-2021-28507 2022-01-14 2024-11-21 5.5 4.9 Unknown
CVE-2021-28503 2022-02-04 2024-11-21 7.4 6.8 Likely
CVE-2021-28504 2022-04-01 2024-11-21 7.5 4.3 Likely
CVE-2021-28505 2022-04-14 2024-11-21 7.5 5.0 Likely
CVE-2021-28508 2022-05-26 2024-11-21 6.8 3.6 Unknown
CVE-2021-28509 2022-05-26 2024-11-21 6.1 3.6 Unknown
CVE-2021-28511 2022-08-05 2024-11-21 5.8 - -
CVE-2022-29071 2022-08-05 2024-11-21 4.0 - -
CVE-2021-28510 2023-01-26 2024-11-21 5.3 - -
CVE-2023-24513 2023-04-12 2024-11-21 6.5 - -
CVE-2023-24511 2023-04-12 2024-11-21 5.3 - -
CVE-2023-24545 2023-04-12 2024-11-21 7.5 - -
CVE-2023-24509 2023-04-13 2024-11-21 9.3 - -
CVE-2023-24512 2023-04-25 2024-11-21 8.8 - -
CVE-2023-24510 2023-06-05 2024-11-21 7.5 - -
CVE-2023-24546 2023-06-13 2025-01-06 8.1 - -
CVE-2023-24548 2023-08-29 2024-11-21 5.3 - -
CVE-2023-3646 2023-08-29 2024-11-21 5.9 - -
CVE-2023-24547 2023-12-06 2024-11-21 5.9 - -
CVE-2023-6068 2024-03-04 2025-12-18 3.1 - -
CVE-2024-27889 2024-03-04 2025-10-22 8.8 - -
CVE-2024-6387 2024-07-01 2025-09-30 8.1 - -
CVE-2024-12829 2024-12-20 2025-01-03 8.8 - -
CVE-2024-12830 2024-12-20 2025-01-03 7.3 - -
CVE-2024-12831 2024-12-20 2025-01-03 7.8 - -
CVE-2024-12832 2024-12-20 2025-01-03 6.3 - -
CVE-2024-47517 2025-01-10 2025-09-29 6.8 - -
CVE-2024-47518 2025-01-10 2025-09-29 6.4 - -
CVE-2024-47519 2025-01-10 2025-09-29 8.3 - -
CVE-2024-47520 2025-01-10 2025-09-29 7.6 - -
CVE-2024-9131 2025-01-10 2025-09-29 7.2 - -
CVE-2024-9132 2025-01-10 2025-09-29 8.1 - -
CVE-2024-9133 2025-01-10 2025-09-29 6.6 - -
CVE-2024-9134 2025-01-10 2025-12-18 8.3 - -
CVE-2024-9188 2025-01-10 2025-09-29 8.8 - -
CVE-2025-2767 2025-04-23 2025-08-14 9.6 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for arista by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with arista's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.