<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2025-0505 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0505/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sat, 18 Apr 2026 09:19:42 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2025-0505</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0505/#post-20043</link>
                        <pubDate>Fri, 20 Feb 2026 22:55:45 +0000</pubDate>
                        <description><![CDATA[Description
On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more per...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state for devices under management. Note that CloudVision as-a-Service is not affected.</p>
<h4>Affected Software</h4>
<div><strong>CloudVision Portal Versions</strong></div>
<ul>
<li>2024.2.0 and 2024.2.1</li>
<li>2024.3.0</li>
</ul>
<p> </p>
<h4>Affected Platforms</h4>
<div>The following products<span> </span><strong>are</strong><span> </span>affected by this vulnerability:</div>
<ul>
<li>CloudVision Portal, virtual appliance or physical appliance</li>
<li>CloudVision CUE, virtual appliance or physical appliance</li>
</ul>
<h3>Mitigation</h3>
<p><span>The ZTP component on CloudVision (on-premise) can be disabled by running the following on any of the nodes of the CloudVision deployment.</span></p>
<blockquote>
<pre contenteditable="false">cvpi disable ztp
cvpi stop ztp</pre>
</blockquote>
<p data-testid="vuln-description"><span>The following command can be used to verify that the component is stopped:</span></p>
<pre contenteditable="false">cvpi status ztp
 
Executing command. This may take some time...
Completed 1/1 discovered actions
primary  components total:1 running:0 disabled:1</pre>
<h3> </h3>
<h3 id="pageLink-1">Resolution</h3>
<p>The recommended resolution is to upgrade to a remediated software version at your earliest convenience. </p>
<div class="clear10"> </div>
<div>CVE-2025-0505 has been fixed in the following releases:</div>
<ul>
<li style="list-style-type: none">
<ul>
<li style="list-style-type: none">
<ul>
<li>2024.2.2 and later releases in the 2024.2.x train</li>
<li>2024.3.1 and later releases in the 2024.3.x train</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3>References</h3>
<p>https://www.arista.com/en/support/advisories-notices/security-advisory/21315-security-advisory-0115</p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2025-0505</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0505/#post-20043</guid>
                    </item>
							        </channel>
        </rss>
		