Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
References
Configurations
History
04 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 05:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://blog.champtar.fr/VLAN0_LLC_SNAP/ - | |
| References | () https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/ - Vendor Advisory | |
| References | () https://kb.cert.org/vuls/id/855201 - | |
| References | () https://standards.ieee.org/ieee/802.1Q/10323/ - Vendor Advisory | |
| References | () https://standards.ieee.org/ieee/802.2/1048/ - Vendor Advisory |
Information
Published : 2022-09-27 19:15
Updated : 2025-11-04 20:15
NVD link : CVE-2021-27854
Mitre link : CVE-2021-27854
CVE.ORG link : CVE-2021-27854
JSON object : View
Products Affected
ietf
- p802.1q
ieee
- ieee_802.2
CWE
CWE-290
Authentication Bypass by Spoofing
