{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:24:43.143","vulnerabilities":[{"cve":{"id":"CVE-2021-27854","sourceIdentifier":"cret@cert.org","published":"2022-09-27T19:15:09.240","lastModified":"2025-11-04T20:15:59.750","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse."},{"lang":"es","value":"Las capacidades de filtrado de red de capa 2, como la protección RA de IPv6, pueden omitirse usando combinaciones de encabezados VLAN 0, encabezados LLC/SNAP y convirtiendo tramas de Ethernet a Wifi y su inversa"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-290"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-290"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ieee:ieee_802.2:*:*:*:*:*:*:*:*","versionEndIncluding":"802.2h-1997","matchCriteriaId":"D5B0DDC2-21C5-4682-9AA2-055BF7C722DA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ietf:p802.1q:*:*:*:*:*:*:*:*","versionEndIncluding":"d1.0","matchCriteriaId":"94105D2E-950F-4290-8840-301FA908BC8C"}]}]}],"references":[{"url":"https://blog.champtar.fr/VLAN0_LLC_SNAP/","source":"cret@cert.org"},{"url":"https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/","source":"cret@cert.org","tags":["Vendor Advisory"]},{"url":"https://kb.cert.org/vuls/id/855201","source":"cret@cert.org"},{"url":"https://standards.ieee.org/ieee/802.1Q/10323/","source":"cret@cert.org","tags":["Vendor Advisory"]},{"url":"https://standards.ieee.org/ieee/802.2/1048/","source":"cret@cert.org","tags":["Vendor Advisory"]},{"url":"https://blog.champtar.fr/VLAN0_LLC_SNAP/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://kb.cert.org/vuls/id/855201","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://standards.ieee.org/ieee/802.1Q/10323/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://standards.ieee.org/ieee/802.2/1048/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/855201","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}