On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/15267-security-advisory-0073 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-04-14 21:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-28505
Mitre link : CVE-2021-28505
CVE.ORG link : CVE-2021-28505
JSON object : View
Products Affected
arista
- eos
- ccs-720xp-48y6
- ccs-720xp-48zc2
- ccs-722xpm-48zy8
- dcs-7050cx3-32s
- dcs-7050sx3-48yc12
- dcs-7050tx3-48c8
- ccs-710p-12
- ccs-710p-16p
- ccs-722xpm-48y4
- dcs-7050cx3m-32s
- dcs-7050sx3-96yc8
- ccs-720xp-24y6
- dcs-7010tx-48
- ccs-720xp-24zy4
- dcs-7050sx3-48c8
- dcs-7050sx3-48yc8
- ccs-720xp-96zc2