{
  "document": {
    "category": "security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "publisher": {
      "category": "vendor",
      "contact_details": "support@arista.com",
      "name": "Arista PSIRT",
      "namespace": "https://www.arista.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "Security advisory 80 canonical URL",
        "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/16276-security-advisory-0080"
      }
    ],
    "title": "Security Advisory 80",
    "tracking": {
      "current_release_date": "2022-09-27T18:35:03Z",
      "generator": {
        "engine": {
          "name": "Arista Networks SecEng Service CSAF Generator"
        }
      },
      "id": "Arista Networks Security Advisory 80",
      "initial_release_date": "2022-09-27T18:35:03Z",
      "revision_history": [
        {
          "date": "2022-09-27T18:35:03Z",
          "number": "1",
          "summary": "Document created"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version",
                    "name": "EOS version 4.22.13",
                    "product": {
                      "name": "EOS version 4.22.13",
                      "product_id": "CSAFPID-0"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "EOS version 4.28.3",
                    "product": {
                      "name": "EOS version 4.28.3",
                      "product_id": "CSAFPID-1"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "EOS version 1.0.0",
                    "product": {
                      "name": "EOS version 1.0.0",
                      "product_id": "CSAFPID-2"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "EOS version 4.23.13",
                    "product": {
                      "name": "EOS version 4.23.13",
                      "product_id": "CSAFPID-4"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "EOS version 4.26.8",
                    "product": {
                      "name": "EOS version 4.26.8",
                      "product_id": "CSAFPID-3"
                    }
                  }
                ],
                "category": "product_name",
                "name": "EOS"
              },
              {
                "branches": [
                  {
                    "category": "product_version",
                    "name": "WiFi version mwm-v11.0.0-36-vv20",
                    "product": {
                      "name": "WiFi version mwm-v11.0.0-36-vv20",
                      "product_id": "CSAFPID-7"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "WiFi version mwm-v1.0.0",
                    "product": {
                      "name": "WiFi version mwm-v1.0.0",
                      "product_id": "CSAFPID-5"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "WiFi version wm-v11.0.1-49-vv16",
                    "product": {
                      "name": "WiFi version wm-v11.0.1-49-vv16",
                      "product_id": "CSAFPID-6"
                    }
                  }
                ],
                "category": "product_name",
                "name": "WiFi"
              }
            ],
            "category": "product_family",
            "name": "Software Products"
          }
        ],
        "category": "vendor",
        "name": "Arista Networks, Inc."
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-27853",
      "id": {
        "system_name": "Arista Bug ID",
        "text": "615000"
      },
      "notes": [
        {
          "category": "description",
          "text": "Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.\n",
          "title": "CVE Description"
        },
        {
          "category": "other",
          "text": "This vulnerability affects customers using the following features:\nARP Inspection\nIP Source Guard\nIP Locking",
          "title": "615000: Required Config for Exploitation"
        }
      ],
      "product_status": {
        "first_affected": [
          "CSAFPID-2"
        ],
        "fixed": [
          "CSAFPID-0",
          "CSAFPID-1",
          "CSAFPID-3",
          "CSAFPID-4"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "MITRE link",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27853"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.22.13",
          "product_ids": [
            "CSAFPID-0"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.23.13",
          "product_ids": [
            "CSAFPID-4"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.26.8",
          "product_ids": [
            "CSAFPID-3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.28.3",
          "product_ids": [
            "CSAFPID-1"
          ]
        },
        {
          "category": "none_available",
          "details": "Not fixed in EOS version 1.0.0",
          "product_ids": [
            "CSAFPID-2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-0",
            "CSAFPID-4",
            "CSAFPID-1"
          ]
        }
      ],
      "title": "CVE-2021-27853"
    },
    {
      "cve": "CVE-2021-27854",
      "id": {
        "system_name": "Arista Bug ID",
        "text": "682330"
      },
      "notes": [
        {
          "category": "description",
          "text": "Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers and Ethernet to Wifi frame translation.",
          "title": "CVE Description"
        },
        {
          "category": "other",
          "text": "SSID Firewall rules matching L3 and L4 headers",
          "title": "682330: Required Config for Exploitation"
        }
      ],
      "product_status": {
        "first_affected": [
          "CSAFPID-5"
        ],
        "fixed": [
          "CSAFPID-6",
          "CSAFPID-7"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "MITRE link",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Fixed in WiFi version mwm-v11.0.0-36-vv20",
          "product_ids": [
            "CSAFPID-7"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in WiFi version wm-v11.0.1-49-vv16",
          "product_ids": [
            "CSAFPID-6"
          ]
        },
        {
          "category": "none_available",
          "details": "Not fixed in WiFi version mwm-v1.0.0",
          "product_ids": [
            "CSAFPID-5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-5"
          ]
        }
      ],
      "title": "CVE-2021-27854"
    },
    {
      "cve": "CVE-2021-27861",
      "id": {
        "system_name": "Arista Bug ID",
        "text": "615000"
      },
      "notes": [
        {
          "category": "description",
          "text": "Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers).",
          "title": "CVE Description"
        },
        {
          "category": "other",
          "text": "This vulnerability affects customers using the following features:\nARP Inspection\nIP Source Guard\nIP Locking",
          "title": "615000: Required Config for Exploitation"
        }
      ],
      "product_status": {
        "first_affected": [
          "CSAFPID-2"
        ],
        "fixed": [
          "CSAFPID-0",
          "CSAFPID-1",
          "CSAFPID-3",
          "CSAFPID-4"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "MITRE link",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.22.13",
          "product_ids": [
            "CSAFPID-0"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.23.13",
          "product_ids": [
            "CSAFPID-4"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.26.8",
          "product_ids": [
            "CSAFPID-3"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in EOS version 4.28.3",
          "product_ids": [
            "CSAFPID-1"
          ]
        },
        {
          "category": "none_available",
          "details": "Not fixed in EOS version 1.0.0",
          "product_ids": [
            "CSAFPID-2"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2",
            "CSAFPID-3",
            "CSAFPID-0",
            "CSAFPID-4",
            "CSAFPID-1"
          ]
        }
      ],
      "title": "CVE-2021-27861"
    },
    {
      "cve": "CVE-2021-27862",
      "id": {
        "system_name": "Arista Bug ID",
        "text": "682330"
      },
      "notes": [
        {
          "category": "description",
          "text": "Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).",
          "title": "CVE Description"
        },
        {
          "category": "other",
          "text": "SSID Firewall rules matching L3 and L4 headers",
          "title": "682330: Required Config for Exploitation"
        }
      ],
      "product_status": {
        "first_affected": [
          "CSAFPID-5"
        ],
        "fixed": [
          "CSAFPID-6",
          "CSAFPID-7"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "MITRE link",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27862"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Fixed in WiFi version mwm-v11.0.0-36-vv20",
          "product_ids": [
            "CSAFPID-7"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Fixed in WiFi version wm-v11.0.1-49-vv16",
          "product_ids": [
            "CSAFPID-6"
          ]
        },
        {
          "category": "none_available",
          "details": "Not fixed in WiFi version mwm-v1.0.0",
          "product_ids": [
            "CSAFPID-5"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-6",
            "CSAFPID-7",
            "CSAFPID-5"
          ]
        }
      ],
      "title": "CVE-2021-27862"
    }
  ]
}