{"vulnerability": "CVE-2021-28505", "sightings": [{"uuid": "cfa6e258-1c25-4867-8291-36f788cfa271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28505", "type": "seen", "source": "https://t.me/cibsecurity/40817", "content": "\u203c CVE-2021-28505 \u203c\n\nOn affected Arista EOS platforms, if a VXLAN match rule exists in an IPv4 access-list that is applied to the ingress of an L2 or an L3 port/SVI, the VXLAN rule and subsequent ACL rules in that access list will ignore the specified IP protocol.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-15T00:19:29.000000Z"}]}