Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-28511


This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could allow a host with an IP address in a range that matches the range allowed by a NAT ACL and a range denied by a Security ACL to be forwarded incorrectly as it should have been denied by the Security ACL. This can enable an ACL bypass.


Published

2022-08-05T17:15:07.957

Last Modified

2024-11-21T05:59:48.747

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.8 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System arista eos ≤ 4.24.9 Yes
Operating System arista eos ≤ 4.25.8 Yes
Operating System arista eos ≤ 4.26.5 Yes
Operating System arista eos ≤ 4.27.3 Yes
Hardware arista 7050cx3-32s - No
Hardware arista 7050cx3m-32s - No
Hardware arista 7050sx3-48c8 - No
Hardware arista 7050sx3-48yc - No
Hardware arista 7050sx3-48yc12 - No
Hardware arista 7050sx3-48yc8 - No
Hardware arista 7050sx3-96yc8 - No
Hardware arista 7050tx3-48c8 - No
Hardware arista 720xp-24y6 - No
Hardware arista 720xp-24zy4 - No
Hardware arista 720xp-48y6 - No
Hardware arista 720xp-48zc2 - No
Hardware arista 720xp-96zc2 - No
Hardware arista 7300x3-32c - No
Hardware arista 7300x3-48yc4 - No

References