Security News > 2022 > September > Ethernet VLAN Stacking flaws let hackers launch DoS, MiTM attacks

Ethernet VLAN Stacking flaws let hackers launch DoS, MiTM attacks
2022-09-28 15:05

Four vulnerabilities in the widely adopted 'Stacked VLAN' Ethernet feature allows attackers to perform denial-of-service or man-in-the-middle attacks against network targets using custom-crafted packets.

Stacked VLANs, also known as VLAN Stacking, is a feature in modern routers and switches that allows companies to encapsulate multiple VLAN IDs into a single VLAN connection shared with an upstream provider.

"With stacked VLANs, service providers can use a unique VLAN to support customers who have multiple VLANs. Customer VLAN IDs are preserved and traffic from different customers is segregated within the service-provider infrastructure even when they appear to be on the same VLAN," explains Cisco's documentation on the feature.

The vulnerabilities exist in the Ethernet encapsulation protocols that allow the stacking of Virtual Local Area Network headers.

CVE-2021-27854 Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers in Ethernet to Wifi frame translation, and the reverse Wifi to Ethernet.

One thing to note is that in modern cloud-based virtualization and virtual networking products, the L2 network capability extends beyond LAN, so the exposure of these flaws could be extended to the internet.


News URL

https://www.bleepingcomputer.com/news/security/ethernet-vlan-stacking-flaws-let-hackers-launch-dos-mitm-attacks/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-09-27 CVE-2021-27854 Authentication Bypass by Spoofing vulnerability in multiple products
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
low complexity
ieee ietf CWE-290
4.7