On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089 | Exploit Vendor Advisory |
https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-29 17:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24548
Mitre link : CVE-2023-24548
CVE.ORG link : CVE-2023-24548
JSON object : View
Products Affected
arista
- 7800r3-36d
- 7280cr3a-48d6
- 7800r3k-36dm
- 7812r3
- 7280cr3-32d4
- 7500r3k-48y4d
- eos
- 7800r3k-48cq
- 7800r3-36p
- 7280cr3-36s
- 7280cr3-32p4
- 7800r3k-48cqms
- 7280dr3a-54
- 7500r3-24d
- 7280pr3-24
- 7800r3a-36d
- 7280dr3ak-36
- 7500r3k-36cq
- 7504r3
- 7816r3
- 7800r3a-36pm
- 7800r3ak-36pm
- 7280dr3a-36
- 7280cr3-96
- 7280tr3-40c6
- 7280dr3am-36
- 7800r3ak-36dm
- 7808r3
- 7280sr3-40yc6
- 7280sr3-48yc8
- 7500r3-24p
- 7800r3a-36dm
- 7508r3
- 7280cr3a-24d12
- 7280r3
- 7800r3-48cq
- 7800r3a-36p
- 7512r3
- 7500r3-36cq
- 7800r3k-72y7512r3
- 7280cr3a-72
- 7280dr3am-54
- 7280dr3ak-54
- 7280dr3-24
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')