CVE-2021-28510

For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
OR cpe:2.3:h:arista:7020r:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7280r:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7280sr3k-48yc8:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7304x3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7308x3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7324x:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7328x:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7508r3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7512r3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7804r3:-:*:*:*:*:*:*:*
cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:59

Type Values Removed Values Added
References () https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076 - Exploit, Mitigation, Vendor Advisory () https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076 - Exploit, Mitigation, Vendor Advisory
Summary
  • (es) Para ciertos sistemas que ejecutan EOS, un paquete de protocolo de tiempo de precisión (PTP) de un mensaje de administración/señalización con un valor de tipo, longitud y valor (TLV) no válido hace que el agente PTP se reinicie. Los reinicios repetidos del servicio harán que el servicio no esté disponible.
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.3

30 Jun 2023, 21:28

Type Values Removed Values Added
CWE CWE-400 CWE-1284

Information

Published : 2023-01-26 21:15

Updated : 2024-11-21 05:59


NVD link : CVE-2021-28510

Mitre link : CVE-2021-28510

CVE.ORG link : CVE-2021-28510


JSON object : View

Products Affected

arista

  • 720xp-48y6
  • 7050sx3-48c8
  • 7280e
  • 7280r
  • 7050sx3-96yc8
  • 7150s-24
  • 7050sx3-48yc12
  • 720xp-48zc2
  • 7170-64c
  • 7280sr3k-48yc8
  • 7050sx2-72q
  • 7300x3-32c
  • 7170-32cd
  • 7328x
  • 7500r3-36cq
  • 7304x3
  • 7050sx3-48yc8
  • 7050sx-72q
  • 7308x3
  • 7050tx2-128
  • 7280r3
  • 720xp-96zc2
  • 7500r
  • 7150sc-24
  • 7500r3
  • 7300x-64s
  • 7060px4-32
  • 7020r
  • 7250qx-64
  • 7060cx-32s
  • 7170-32c
  • 7060sx2-48yc6
  • 7500r3k-36cq
  • 7300x3-48yc4
  • 7060dx4-32
  • 7050tx-64
  • 7500e
  • 7300x-32q
  • 7050sx2-128
  • 7050cx3-32s
  • 7150s-64
  • 7280sr3-48yc8
  • 7050sx-128
  • 7050tx-72q
  • 7060cx2-32s
  • 720xp-24y6
  • 7150s-52
  • 7800r3k-48cq
  • 7804r3
  • 7050cx3m-32s
  • 7050sx-64
  • 7300x-64t
  • 7260cx3-64
  • eos
  • 7050qx-32s
  • 7504r3
  • 7150sc-64
  • 7800r3-36p
  • 7280r2
  • 7512r3
  • 7500r2
  • 7050qx2-32s
  • 7500r3-24p
  • 7260cx3
  • 7260qx
  • 7050tx3-48c8
  • 7050sx3-48yc
  • 7050tx-48
  • 7508r3
  • 720xp-24zy4
  • 7500r3-24d
  • 7260cx
  • 7800r3-48cq
  • 7808r3
  • 7368x4
  • 7320x-32c
  • 7324x
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1284

Improper Validation of Specified Quantity in Input