On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089 | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Arista
Published: 2023-08-29T16:13:10.451Z
Updated: 2023-08-29T16:13:10.451Z
Reserved: 2023-01-26T11:37:43.827Z
Link: CVE-2023-24548
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-08-29T17:15:11.790
Modified: 2023-09-05T18:52:02.053
Link: CVE-2023-24548
JSON object: View
Redhat Information
No data.
CWE