On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-15181 On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2021-28505 has been fixed in the following releases: 4.26.4M and later releases in the 4.26.x train 4.27.1F and later releases in the 4.27.x train


Workaround

Replace "vxlan" IP protocol match with match on IP protocol "udp" and Layer 4 destination port for VxLAN encapsulated packets i.e 4789. < br/> If VXLAN L4 destination port number is not the default 4789 then use the configured L4 destination port number.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-16T16:58:06.559Z

Reserved: 2021-03-16T00:00:00

Link: CVE-2021-28505

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-14T21:15:08.427

Modified: 2024-11-21T05:59:47.940

Link: CVE-2021-28505

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.