Project Subscriptions
| Vendors | Products |
|---|---|
|
Arista
Subscribe
|
Ccs-710p-12
Subscribe
Ccs-710p-16p
Subscribe
Ccs-720xp-24y6
Subscribe
Ccs-720xp-24zy4
Subscribe
Ccs-720xp-48y6
Subscribe
Ccs-720xp-48zc2
Subscribe
Ccs-720xp-96zc2
Subscribe
Ccs-722xpm-48y4
Subscribe
Ccs-722xpm-48zy8
Subscribe
Dcs-7010tx-48
Subscribe
Dcs-7050cx3-32s
Subscribe
Dcs-7050cx3m-32s
Subscribe
Dcs-7050sx3-48c8
Subscribe
Dcs-7050sx3-48yc12
Subscribe
Dcs-7050sx3-48yc8
Subscribe
Dcs-7050sx3-96yc8
Subscribe
Dcs-7050tx3-48c8
Subscribe
Eos
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15181 | On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2021-28505 has been fixed in the following releases: 4.26.4M and later releases in the 4.26.x train 4.27.1F and later releases in the 4.27.x train
Workaround
Replace "vxlan" IP protocol match with match on IP protocol "udp" and Layer 4 destination port for VxLAN encapsulated packets i.e 4789. < br/> If VXLAN L4 destination port number is not the default 4789 then use the configured L4 destination port number.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-09-16T16:58:06.559Z
Reserved: 2021-03-16T00:00:00
Link: CVE-2021-28505
No data.
Status : Modified
Published: 2022-04-14T21:15:08.427
Modified: 2024-11-21T05:59:47.940
Link: CVE-2021-28505
No data.
OpenCVE Enrichment
No data.
EUVD