Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15181 | On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2021-28505 has been fixed in the following releases: 4.26.4M and later releases in the 4.26.x train 4.27.1F and later releases in the 4.27.x train
Workaround
Replace "vxlan" IP protocol match with match on IP protocol "udp" and Layer 4 destination port for VxLAN encapsulated packets i.e 4789. < br/> If VXLAN L4 destination port number is not the default 4789 then use the configured L4 destination port number.
No history.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-09-16T16:58:06.559Z
Reserved: 2021-03-16T00:00:00
Link: CVE-2021-28505
No data.
Status : Modified
Published: 2022-04-14T21:15:08.427
Modified: 2024-11-21T05:59:47.940
Link: CVE-2021-28505
No data.
OpenCVE Enrichment
No data.
EUVD