Description
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
References (1)
Core 1
Core References
Exploit, Vendor Advisory
https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089
Scores
CVSS v3
5.3
EPSS
0.0005
EPSS Percentile
16.7%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (2)
arista/eos
4.25.0f
arista/eos
4.22.1f - 4.22.13m
Published
Aug 29, 2023
Tracked Since
Feb 18, 2026