Project Subscriptions
| Vendors | Products |
|---|---|
|
Arista
Subscribe
|
7020r
Subscribe
7050cx3-32s
Subscribe
7050cx3m-32s
Subscribe
7050qx-32s
Subscribe
7050qx2-32s
Subscribe
7050sx-128
Subscribe
7050sx-64
Subscribe
7050sx-72q
Subscribe
7050sx2-128
Subscribe
7050sx2-72q
Subscribe
7050sx3-48c8
Subscribe
7050sx3-48yc
Subscribe
7050sx3-48yc12
Subscribe
7050sx3-48yc8
Subscribe
7050sx3-96yc8
Subscribe
7050tx-48
Subscribe
7050tx-64
Subscribe
7050tx-72q
Subscribe
7050tx2-128
Subscribe
7050tx3-48c8
Subscribe
7060cx-32s
Subscribe
7060cx2-32s
Subscribe
7060dx4-32
Subscribe
7060px4-32
Subscribe
7060sx2-48yc6
Subscribe
7150s-24
Subscribe
7150s-52
Subscribe
7150s-64
Subscribe
7150sc-24
Subscribe
7150sc-64
Subscribe
7170-32c
Subscribe
7170-32cd
Subscribe
7170-64c
Subscribe
720xp-24y6
Subscribe
720xp-24zy4
Subscribe
720xp-48y6
Subscribe
720xp-48zc2
Subscribe
720xp-96zc2
Subscribe
7250qx-64
Subscribe
7260cx
Subscribe
7260cx3
Subscribe
7260cx3-64
Subscribe
7260qx
Subscribe
7280e
Subscribe
7280r
Subscribe
7280r2
Subscribe
7280r3
Subscribe
7280sr3-48yc8
Subscribe
7280sr3k-48yc8
Subscribe
7300x-32q
Subscribe
7300x-64s
Subscribe
7300x-64t
Subscribe
7300x3-32c
Subscribe
7300x3-48yc4
Subscribe
7304x3
Subscribe
7308x3
Subscribe
7320x-32c
Subscribe
7324x
Subscribe
7328x
Subscribe
7368x4
Subscribe
7500e
Subscribe
7500r
Subscribe
7500r2
Subscribe
7500r3
Subscribe
7500r3-24d
Subscribe
7500r3-24p
Subscribe
7500r3-36cq
Subscribe
7500r3k-36cq
Subscribe
7504r3
Subscribe
7508r3
Subscribe
7512r3
Subscribe
7800r3-36p
Subscribe
7800r3-48cq
Subscribe
7800r3k-48cq
Subscribe
7804r3
Subscribe
7808r3
Subscribe
Eos
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15186 | For certain systems running EOS, a Precision Time Protocol (PTP) packet of a management/signaling message with an invalid Type-Length-Value (TLV) causes the PTP agent to restart. Repeated restarts of the service will make the service unavailable. |
Solution
The recommended resolution is to upgrade to a remediated software version at your earliest convenience. Artista recommends customers move to the latest version of each release that contains all the fixes listed below. CVE-2021-28510 has been fixed in the following releases: 4.27.2 and later releases in the 4.27.x train 4.26.5 and later releases in the 4.26.x train 4.25.7 and later releases in the 4.25.x train 4.24.9 and later releases in the 4.24.x train 4.23.11 and later releases in the 4.23.x train
Workaround
Install ACL rules to drop PTP packets from untrusted sources. Best practice is to block access to untrusted (non-management) networks.
Tue, 01 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Arista
Published:
Updated: 2025-04-01T18:44:26.214Z
Reserved: 2021-03-16T00:00:00.000Z
Link: CVE-2021-28510
Updated: 2024-08-03T21:47:32.671Z
Status : Modified
Published: 2023-01-26T21:15:22.147
Modified: 2024-11-21T05:59:48.603
Link: CVE-2021-28510
No data.
OpenCVE Enrichment
No data.
EUVD