On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-28564 On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. For more information about upgrading see EOS User Manual: Upgrades and Downgrades https://www.arista.com/en/um-eos/eos-upgrades-and-downgrades CVE-2023-24548 has been fixed in the following releases: * 4.30.0F and later releases in the 4.30.x train * 4.29.0F and later releases in the 4.29.x train * 4.28.0F and later releases in the 4.28.x train * 4.27.0F and later releases in the 4.27.x train * 4.26.0F and later releases in the 4.26.x train * 4.25.1F and later releases in the 4.25.x train No remediation is planned for EOS software versions that are beyond their standard EOS support lifecycle https://www.arista.com/en/support/product-documentation/eos-life-cycle-policy (i.e. 4.22, 4.23).


Workaround

There is no known mitigation for the issue. The recommended resolution is to upgrade to a remediated software version at your earliest convenience.

History

Mon, 30 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-09-30T17:46:19.199Z

Reserved: 2023-01-26T11:37:43.827Z

Link: CVE-2023-24548

cve-icon Vulnrichment

Updated: 2024-08-02T11:03:18.834Z

cve-icon NVD

Status : Modified

Published: 2023-08-29T17:15:11.790

Modified: 2024-11-21T07:48:06.157

Link: CVE-2023-24548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.