On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some
Advisories
Source ID Title
EUVD EUVD EUVD-2023-58325 On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some
Fixes

Solution

The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2023-6068 has been fixed in the following releases: * MultiAccess FPGA 1.8.0 and later


Workaround

The workaround is to only apply one access-list to any particular port after the MultiAccess image is loaded into the FPGA. If a new access-list is to be applied to a port, the FPGA image should be reloaded after the access-list is applied. Run the following commands to reload the FPGA image, where the line in yellow represents new access control lists to be added: switch(config-app-multiaccess)#shut switch(config-app-multiaccess)#multiaccess-group 0 client 0 access-list new_acl_if_need switch(config-app-multiaccess)#no shut The previous applied access control lists will automatically apply after FPGA reload.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2024-08-02T08:21:17.180Z

Reserved: 2023-11-09T23:06:28.873Z

Link: CVE-2023-6068

cve-icon Vulnrichment

Updated: 2024-08-02T08:21:17.180Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-04T20:15:50.267

Modified: 2024-11-21T08:43:04.790

Link: CVE-2023-6068

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.