Vulnerability Details : CVE-2021-28510
Potential exploit
For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable.
Vulnerability category: Input validation
Products affected by CVE-2021-28510
- cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
- cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-28510
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-28510
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
Arista Networks, Inc. |
CWE ids for CVE-2021-28510
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by:
- nvd@nist.gov (Primary)
- psirt@arista.com (Secondary)
-
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-28510
-
https://www.arista.com/en/support/advisories-notices/security-advisory/15439-security-advisory-0076
Security Advisory 0076 - AristaExploit;Mitigation;Vendor Advisory
Jump to