Description
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
Published: 2023-08-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2023-24548 has been fixed in the following releases: * 4.30.0F and later releases in the 4.30.x train * 4.29.0F and later releases in the 4.29.x train * 4.28.0F and later releases in the 4.28.x train * 4.27.0F and later releases in the 4.27.x train * 4.26.0F and later releases in the 4.26.x train * 4.25.1F and later releases in the 4.25.x train No remediation is planned for EOS software versions that are beyond their standard EOS support lifecycle https://www.arista.com/en/support/product-documentation/eos-life-cycle-policy (i.e. 4.22, 4.23).


Vendor Workaround

There is no known mitigation for the issue. The recommended resolution is to upgrade to a remediated software version at your earliest convenience.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-28564 On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
History

Mon, 30 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Arista 7280cr3-32d4 7280cr3-32p4 7280cr3-36s 7280cr3-96 7280cr3a-24d12 7280cr3a-48d6 7280cr3a-72 7280dr3-24 7280dr3a-36 7280dr3a-54 7280dr3ak-36 7280dr3ak-54 7280dr3am-36 7280dr3am-54 7280pr3-24 7280r3 7280sr3-40yc6 7280sr3-48yc8 7280tr3-40c6 7500r3-24d 7500r3-24p 7500r3-36cq 7500r3k-36cq 7500r3k-48y4d 7504r3 7508r3 7512r3 7800r3-36d 7800r3-36p 7800r3-48cq 7800r3a-36d 7800r3a-36dm 7800r3a-36p 7800r3a-36pm 7800r3ak-36dm 7800r3ak-36pm 7800r3k-36dm 7800r3k-48cq 7800r3k-48cqms 7800r3k-72y7512r3 7808r3 7812r3 7816r3 Eos
cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-30T17:46:19.199Z

Reserved: 2023-01-26T11:37:43.827Z

Link: CVE-2023-24548

cve-icon Vulnrichment

Updated: 2024-08-02T11:03:18.834Z

cve-icon NVD

Status : Modified

Published: 2023-08-29T17:15:11.790

Modified: 2024-11-21T07:48:06.157

Link: CVE-2023-24548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses