CVE-2021-27853 - CISCO
CISCO, IOS
CVE-2021-27853
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0headers and LLC/SNAP headers.
True
False
You can find more insights and intelligence on this CVE at: https://vi.loginsoft.com/app/cve/CVE-2021-27853
To ascertain the vulnerable conditions and product versions deemed affected, issue the following commands and look for its associated as stated. If one more conditions matches then we can consider it as affected.
show version
Cisco IOS Software
show version
IE-2[0-9]{3}U
show version
WS-C65[0-9]{2}
show version
WS-C68[0-9]{2}
show version
WS-C3650-[0-9]{1,2}
show version
WS-C3850-[0-9]{2}
show version
C9200[d]
show version
C9300[d]
show version
C9400[d]
show version
C9500[d]
show version
C9600[d]
15.5(01.01.85)SY07
15.2(07)E02
15.2(07)E03
https://standards.ieee.org/ieee/802.1Q/10323/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX
https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/
https://standards.ieee.org/ieee/802.2/1048/
https://blog.champtar.fr/VLAN0_LLC_SNAP/
Get in touch with us to explore how our Security Content Suite can optimize vulnerability management for your needs.
IN-HOUSE EXPERTISE
Get practical solutions to real-world challenges, straight from experts who conquered them.
View all our articles