Vulnslist

find the latest Cisco vulnerabilities

Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022

cisco-sa-VU855201-J3z8CKTX · Medium · Published · Updated

On September 27, 2022, the following vulnerabilities affecting Cisco products were disclosed by Cert/CC as part of VU855201, titled L2 network security controls can be bypassed using VLAN 0 stacking and/or 802.3 headers: CVE-2021-27853: Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using a combination of VLAN 0 headers and LLC/SNAP headers. CVE-2021-27854: Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using a combination of VLAN 0 headers, LLC/SNAP headers in Ethernet to Wifi frame translation, and in the reverse—Wifi to Ethernet. CVE-2021-27861: Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers). CVE-2021-27862: Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers). Exploitation of these vulnerabilities could allow an adjacent attacker to bypass configured first-hop security (FHS) features on the affected Cisco products. For more information about these vulnerabilities, see the Details section of this advisory. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX

Workarounds

There are workarounds that address some of these vulnerabilities.
CVE-2021-27853
Administrators may drop packets that cannot have their ethertype detected using a Layer 2 access control list (ACL) or where tags are not expected to drop tagged traffic. If a single dot1P header is received, it will still be processed correctly if the network operating system supports it.

The following are examples of Layer 2 ACLs that could be implemented on access ports where FHS has been configured:

Cisco IOS Software ��� Switches

!
mac access-list extended CSCwa14271
permit any any 0x86DD 0x0
permit any any 0x800 0x0
permit any any 0x806 0x0
deny any any
!
interface GigabitEthernet1/0/1
switchport access vlan 5
switchport voice vlan dot1p
ipv6 nd raguard attach-policy HOSTS
mac access-group CSCwa14271 in
!

Cisco IOS XE Software ��� Switches

For Cisco IOS XE Software on switches, impact to all FHS features occurs on Cisco IOS Software releases 17.6.1 and later, but earlier than the first fixed release. The issue will not be seen if the access port VLAN also has an active switched virtual interface (SVI). If there are access ports in VLAN 5, for example, this issue will be observed only if interface vlan 5 is not configured. To mitigate this issue for vulnerable releases of Cisco IOS Software, administrators can ensure that each VLAN assigned to access ports has a corresponding SVI configured.

For Cisco IOS XE Software on switches, Dynamic ARP Inspection is affected on all releases. Administrators can configure static ARP entries for the default gateways and critical servers and hosts off the segments that are being protected to protect the critical assets in the environment.

Cisco IOS XE Software ��� Routers

For configurations that have a service instance with encapsulation priority-tagged and where the environment needs to examine only the first tag (depending on the platform), administrators can either add the keyword exact after the encapsulation priority-tagged or filter on the ethertype field with encapsulation priority-tagged etype ipv4 , ipv6.

For environments that do not have encapsulation priority-tagged assigned to a service instance, to prevent packets that are tagged with dot1p at the front of the headers from being forwarded, administrators can configure a service instance that is not assigned to a bridge domain with encapsulation priority-tagged.

Cisco IOS XR Software

For configurations that have an l2transport sub interface configured with encapsulation dot1q|dot1ad priority-tagged and where the environment needs to examine only the first tag (depending on the platform), administrators can add the keyword exact after the encapsulation dot1q|dot1ad priority-tagged.

For environments that do not have encapsulation dot1q|dot1ad priority-tagged assigned to an l2transport sub interface, to prevent packets that are tagged with dot1p at the front of the headers from being forwarded, administrators can configure l2transport sub interfaces that are not assigned to a bridge domain with encapsulation dot1q priority-tagged and encapsulation dot1ad priority-tagged.

Cisco NX-OS Software

!
mac access-list drop_three_tags
deny any any 0x8100
deny any any 0x88a8
permit any any
!
interface ethernet 1/4
mac port access-group drop_three_tags
!

Cisco Small Business Switches

To ensure that FHS works correctly on access ports, install a MAC ACL to deny only tagged frames (because they are not to be expected on an access port) or to permit only ARP, IPv4, and IPv6 on all access ports. The following is an example from the Cisco Sx250, 350, and 550 Series Smart Switches and the Cisco Business 250 and 350 Series Smart Switches:

mac access-list extended arp-ip-ip6
permit any any 806 0000 ace-priority 1
permit any any 800 0000 ace-priority 2
permit any any 86dd 0000 ace-priority 3

CVE-2021-27861
The principle for mitigating CVE-2021-27861 is to drop any packets that cannot have their Layer 3 protocol detected using a Layer 2 ACL.

The following are examples of Layer 2 ACLs that could be implemented on access ports where FHP has been configured:

Cisco IOS Software ��� Switches

No mitigations or workarounds.

Cisco IOS XR Software

No mitigations or workarounds.

Cisco NX-OS Software

!
interface Ethernet1/3
switchport
switchport access vlan 5
mac port access-group drop_non
ipv6 nd raguard attach-policy HOSTS
!
interface Ethernet1/4
switchport
switchport access vlan 5
mac port access-group drop_non
ipv6 nd raguard attach-policy CSCvw92154
!
mac access-list drop_non
10 permit any any 0x86dd
20 permit any any ip
30 permit any any 0x806
35 permit any 0100.0ccc.cccc 0000.0000.0000
40 deny any any
!

Cisco Small Business Switches

No mitigations or workarounds.

While these workarounds have been deployed and were proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2021-27853, CVE-2021-27854, CVE-2021-27861, CVE-2021-27862
Cisco Bug IDsCSCvz96133, CSCwa18093, CSCvz91291, CSCwb01481, CSCwa14271, CSCwa06145, CSCwa14942, CSCvw99743, CSCvx33758, CSCvx35087, CSCvx35085, CSCvz89602, CSCvz88705, CSCvw92154, CSCwa18209, CSCwa01097, CSCwa18310, CSCwa14282, CSCwa14950, CSCwa06265, CSCwa09081, CSCwa04809, CSCvx37987
CVSS ScoreBase 4.7
Base 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS, Cisco IOS XR Software, Cisco NX-OS Software, Cisco IOS XE Software, Cisco Aironet Access Point Software, Cisco Small Business Smart and Managed Switches

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Aironet Access Point Software known_affected cisco_csaf CVE-2021-27854 1
Cisco IOS known_affected cisco_csaf CVE-2021-27853, CVE-2021-27861 2
Cisco IOS XE Software known_affected cisco_csaf CVE-2021-27853 1
Cisco IOS XR Software known_affected cisco_csaf CVE-2021-27853, CVE-2021-27861 2
Cisco NX-OS Software known_affected cisco_csaf CVE-2021-27853, CVE-2021-27861 2
Cisco Small Business Smart and Managed Switches known_affected cisco_csaf CVE-2021-27853, CVE-2021-27861 2

Related Products

Product CVE Evidence
Cisco Catalyst 9300 Series Switches CVE-2021-27861 Cisco OpenVuln · software-dependent
Cisco Aironet Access Point Software CVE-2021-27861 Cisco OpenVuln
Cisco IOS XE Software CVE-2021-27861 Cisco OpenVuln
Cisco IOS XR Software CVE-2021-27861 Cisco OpenVuln
Cisco NX-OS Software CVE-2021-27861 Cisco OpenVuln
Cisco Small Business Smart and Managed Switches CVE-2021-27861 Cisco OpenVuln
Cisco IOS CVE-2021-27861 Cisco OpenVuln
Cisco Catalyst 9200 Series Switches CVE-2021-27861 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2021-27861 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2021-27861 Cisco OpenVuln · software-dependent
Cisco Catalyst 9600 Series Switches CVE-2021-27861 Cisco OpenVuln · software-dependent
Cisco IOS Software CVE-2021-27861 Cisco OpenVuln
Cisco Catalyst 9300 Series Switches CVE-2021-27853 Cisco OpenVuln · software-dependent
Cisco Aironet Access Point Software CVE-2021-27853 Cisco OpenVuln
Cisco IOS XE Software CVE-2021-27853 Cisco OpenVuln
Cisco IOS XR Software CVE-2021-27853 Cisco OpenVuln
Cisco NX-OS Software CVE-2021-27853 Cisco OpenVuln
Cisco Small Business Smart and Managed Switches CVE-2021-27853 Cisco OpenVuln
Cisco IOS CVE-2021-27853 Cisco OpenVuln
Cisco Catalyst 9200 Series Switches CVE-2021-27853 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2021-27853 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2021-27853 Cisco OpenVuln · software-dependent
Cisco Catalyst 9600 Series Switches CVE-2021-27853 Cisco OpenVuln · software-dependent
Cisco IOS Software CVE-2021-27853 Cisco OpenVuln
Cisco Catalyst 9300 Series Switches CVE-2021-27854 Cisco OpenVuln · software-dependent
Cisco Aironet Access Point Software CVE-2021-27854 Cisco OpenVuln
Cisco IOS XE Software CVE-2021-27854 Cisco OpenVuln
Cisco IOS XR Software CVE-2021-27854 Cisco OpenVuln
Cisco NX-OS Software CVE-2021-27854 Cisco OpenVuln
Cisco Small Business Smart and Managed Switches CVE-2021-27854 Cisco OpenVuln
Cisco IOS CVE-2021-27854 Cisco OpenVuln
Cisco Catalyst 9200 Series Switches CVE-2021-27854 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2021-27854 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2021-27854 Cisco OpenVuln · software-dependent
Cisco Catalyst 9600 Series Switches CVE-2021-27854 Cisco OpenVuln · software-dependent
Cisco IOS Software CVE-2021-27854 Cisco OpenVuln
Cisco Catalyst 9300 Series Switches CVE-2021-27862 Cisco OpenVuln · software-dependent
Cisco Aironet Access Point Software CVE-2021-27862 Cisco OpenVuln
Cisco IOS XE Software CVE-2021-27862 Cisco OpenVuln
Cisco IOS XR Software CVE-2021-27862 Cisco OpenVuln
Cisco NX-OS Software CVE-2021-27862 Cisco OpenVuln
Cisco Small Business Smart and Managed Switches CVE-2021-27862 Cisco OpenVuln
Cisco IOS CVE-2021-27862 Cisco OpenVuln
Cisco Catalyst 9200 Series Switches CVE-2021-27862 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2021-27862 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2021-27862 Cisco OpenVuln · software-dependent
Cisco Catalyst 9600 Series Switches CVE-2021-27862 Cisco OpenVuln · software-dependent
Cisco IOS Software CVE-2021-27862 Cisco OpenVuln