Description
On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
Published: 2022-04-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2021-28505 has been fixed in the following releases: 4.26.4M and later releases in the 4.26.x train 4.27.1F and later releases in the 4.27.x train


Vendor Workaround

Replace "vxlan" IP protocol match with match on IP protocol "udp" and Layer 4 destination port for VxLAN encapsulated packets i.e 4789. < br/> If VXLAN L4 destination port number is not the default 4789 then use the configured L4 destination port number.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-15181 On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
History

No history.

Subscriptions

Arista Ccs-710p-12 Ccs-710p-16p Ccs-720xp-24y6 Ccs-720xp-24zy4 Ccs-720xp-48y6 Ccs-720xp-48zc2 Ccs-720xp-96zc2 Ccs-722xpm-48y4 Ccs-722xpm-48zy8 Dcs-7010tx-48 Dcs-7050cx3-32s Dcs-7050cx3m-32s Dcs-7050sx3-48c8 Dcs-7050sx3-48yc12 Dcs-7050sx3-48yc8 Dcs-7050sx3-96yc8 Dcs-7050tx3-48c8 Eos
cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-16T16:58:06.559Z

Reserved: 2021-03-16T00:00:00.000Z

Link: CVE-2021-28505

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-14T21:15:08.427

Modified: 2024-11-21T05:59:47.940

Link: CVE-2021-28505

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses