Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Link | Tags |
---|---|
https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/ | third party advisory technical description |
https://standards.ieee.org/ieee/802.2/1048/ | vendor advisory |
https://standards.ieee.org/ieee/802.1Q/10323/ | vendor advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX | third party advisory vendor advisory |
https://kb.cert.org/vuls/id/855201 | third party advisory us government resource |
https://blog.champtar.fr/VLAN0_LLC_SNAP/ | third party advisory exploit |