No analysis available yet.
Vendor Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2021-28510 has been fixed in the following releases: 4.27.2 and later releases in the 4.27.x train 4.26.5 and later releases in the 4.26.x train 4.25.7 and later releases in the 4.25.x train 4.24.9 and later releases in the 4.24.x train 4.23.11 and later releases in the 4.23.x train
Vendor Workaround
Install ACL rules to drop PTP packets from untrusted sources. Best practice is to block access to untrusted (non-management) networks.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15186 | For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable. |
Tue, 01 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-04-01T18:44:26.214Z
Reserved: 2021-03-16T00:00:00.000Z
Link: CVE-2021-28510
Updated: 2024-08-03T21:47:32.671Z
Status : Modified
Published: 2023-01-26T21:15:22.147
Modified: 2024-11-21T05:59:48.603
Link: CVE-2021-28510
No data.
OpenCVE Enrichment
No data.
EUVD