Vulnerability: VXLAN Match Rule Bypasses IP Protocol Specification in Arista EOS Platforms

Vulnerability: VXLAN Match Rule Bypasses IP Protocol Specification in Arista EOS Platforms

CVE-2021-28505 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.

Learn more about our Web Application Penetration Testing UK.