On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.

Project Subscriptions

Vendors Products
7280cr3-32d4 Subscribe
7280cr3-32p4 Subscribe
7280cr3-36s Subscribe
7280cr3-96 Subscribe
7280cr3a-24d12 Subscribe
7280cr3a-48d6 Subscribe
7280cr3a-72 Subscribe
7280dr3-24 Subscribe
7280dr3a-36 Subscribe
7280dr3a-54 Subscribe
7280dr3ak-36 Subscribe
7280dr3ak-54 Subscribe
7280dr3am-36 Subscribe
7280dr3am-54 Subscribe
7280pr3-24 Subscribe
7280sr3-40yc6 Subscribe
7280sr3-48yc8 Subscribe
7280tr3-40c6 Subscribe
7500r3-24d Subscribe
7500r3-24p Subscribe
7500r3-36cq Subscribe
7500r3k-36cq Subscribe
7500r3k-48y4d Subscribe
7800r3-36d Subscribe
7800r3-36p Subscribe
7800r3-48cq Subscribe
7800r3a-36d Subscribe
7800r3a-36dm Subscribe
7800r3a-36p Subscribe
7800r3a-36pm Subscribe
7800r3ak-36dm Subscribe
7800r3ak-36pm Subscribe
7800r3k-36dm Subscribe
7800r3k-48cq Subscribe
7800r3k-48cqms Subscribe
7800r3k-72y7512r3 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-28564 On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2023-24548 has been fixed in the following releases: * 4.30.0F and later releases in the 4.30.x train * 4.29.0F and later releases in the 4.29.x train * 4.28.0F and later releases in the 4.28.x train * 4.27.0F and later releases in the 4.27.x train * 4.26.0F and later releases in the 4.26.x train * 4.25.1F and later releases in the 4.25.x train No remediation is planned for EOS software versions that are beyond their standard EOS support lifecycle https://www.arista.com/en/support/product-documentation/eos-life-cycle-policy (i.e. 4.22, 4.23).


Workaround

There is no known mitigation for the issue. The recommended resolution is to upgrade to a remediated software version at your earliest convenience.

History

Mon, 30 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-30T17:46:19.199Z

Reserved: 2023-01-26T11:37:43.827Z

Link: CVE-2023-24548

cve-icon Vulnrichment

Updated: 2024-08-02T11:03:18.834Z

cve-icon NVD

Status : Modified

Published: 2023-08-29T17:15:11.790

Modified: 2024-11-21T07:48:06.157

Link: CVE-2023-24548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses