First published: Tue Sep 27 2022(Updated: )
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ieee Ieee 802.2 | <=802.2h-1997 | |
Ietf P802.1q | <=d1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27854 is a vulnerability that allows bypassing layer 2 network filtering capabilities such as IPv6 RA guard using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
The severity of CVE-2021-27854 is medium with a severity value of 4.7.
CVE-2021-27854 can be exploited by using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse to bypass layer 2 network filtering capabilities such as IPv6 RA guard.
CVE-2021-27854 affects IEEE 802.2 with version up to and including 802.2h-1997, and IETF P802.1q with version up to and including d1.0.
To fix CVE-2021-27854, it is recommended to apply the necessary patches or updates provided by the respective vendors or software developers.