On affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.
Solution:
Workaround:
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/15267-security-advisory-0073 | vendor advisory exploit |