Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28564 | On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2023-24548 has been fixed in the following releases: * 4.30.0F and later releases in the 4.30.x train * 4.29.0F and later releases in the 4.29.x train * 4.28.0F and later releases in the 4.28.x train * 4.27.0F and later releases in the 4.27.x train * 4.26.0F and later releases in the 4.26.x train * 4.25.1F and later releases in the 4.25.x train No remediation is planned for EOS software versions that are beyond their standard EOS support lifecycle https://www.arista.com/en/support/product-documentation/eos-life-cycle-policy (i.e. 4.22, 4.23).
Workaround
There is no known mitigation for the issue. The recommended resolution is to upgrade to a remediated software version at your earliest convenience.
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-09-30T17:46:19.199Z
Reserved: 2023-01-26T11:37:43.827Z
Link: CVE-2023-24548
Updated: 2024-08-02T11:03:18.834Z
Status : Modified
Published: 2023-08-29T17:15:11.790
Modified: 2024-11-21T07:48:06.157
Link: CVE-2023-24548
No data.
OpenCVE Enrichment
No data.
EUVD