Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58325 | On affected 7130 Series FPGA platforms running MOS and recent versions of the MultiAccess FPGA, application of ACL’s may result in incorrect operation of the configured ACL for a port resulting in some packets that should be denied being permitted and some |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Arista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2023-6068 has been fixed in the following releases: * MultiAccess FPGA 1.8.0 and later
Workaround
The workaround is to only apply one access-list to any particular port after the MultiAccess image is loaded into the FPGA. If a new access-list is to be applied to a port, the FPGA image should be reloaded after the access-list is applied. Run the following commands to reload the FPGA image, where the line in yellow represents new access control lists to be added: switch(config-app-multiaccess)#shut switch(config-app-multiaccess)#multiaccess-group 0 client 0 access-list new_acl_if_need switch(config-app-multiaccess)#no shut The previous applied access control lists will automatically apply after FPGA reload.
No history.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2024-08-02T08:21:17.180Z
Reserved: 2023-11-09T23:06:28.873Z
Link: CVE-2023-6068
Updated: 2024-08-02T08:21:17.180Z
Status : Awaiting Analysis
Published: 2024-03-04T20:15:50.267
Modified: 2024-11-21T08:43:04.790
Link: CVE-2023-6068
No data.
OpenCVE Enrichment
No data.
EUVD