Vulnerabilites related to IETF - draft-ietf-v6ops-ra-guard-08
cve-2021-27862
Vulnerability from cvelistv5
Published
2022-09-27 18:40
Modified
2024-09-16 20:43
Severity ?
EPSS score ?
Summary
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | IEEE | 802.2 |
Version: 802.2h-1997 < |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T21:33:15.798Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/", }, { tags: [ "x_transferred", ], url: "https://standards.ieee.org/ieee/802.2/1048/", }, { tags: [ "x_transferred", ], url: "https://kb.cert.org/vuls/id/855201", }, { tags: [ "x_transferred", ], url: "https://blog.champtar.fr/VLAN0_LLC_SNAP/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "802.2", vendor: "IEEE", versions: [ { lessThanOrEqual: "802.2h-1997", status: "affected", version: "802.2h-1997", versionType: "custom", }, ], }, { product: "draft-ietf-v6ops-ra-guard-08", vendor: "IETF", versions: [ { lessThanOrEqual: "08", status: "affected", version: "08", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Etienne Champetier (@champtar) <champetier.etienne@gmail.com>", }, ], datePublic: "2022-09-27T00:00:00", descriptions: [ { lang: "en", value: "Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-130", description: "CWE-130 Improper Handling of Length Parameter", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-290", description: "CWE-290: Authentication Bypass by Spoofing", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-12T00:00:00", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { url: "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/", }, { url: "https://standards.ieee.org/ieee/802.2/1048/", }, { url: "https://kb.cert.org/vuls/id/855201", }, { url: "https://blog.champtar.fr/VLAN0_LLC_SNAP/", }, ], source: { discovery: "EXTERNAL", }, title: "L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with an invalid length during Ethernet to Wifi frame translation", }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2021-27862", datePublished: "2022-09-27T18:40:14.712076Z", dateReserved: "2021-03-01T00:00:00", dateUpdated: "2024-09-16T20:43:01.727Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }