Skip to main content

CVE-2021-27862: CWE-130 Improper Handling of Length Parameter in IEEE 802.2

Medium
VulnerabilityCVE-2021-27862cvecve-2021-27862cwe-130cwe-290
Published: Tue Sep 27 2022 (09/27/2022, 18:40:14 UTC)
Source: CVE
Vendor/Project: IEEE
Product: 802.2

Description

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).

AI-Powered Analysis

AILast updated: 07/07/2025, 14:40:21 UTC

Technical Analysis

CVE-2021-27862 is a medium severity vulnerability identified in the IEEE 802.2 standard, specifically the 802.2h-1997 version, which governs Logical Link Control (LLC) and Subnetwork Access Protocol (SNAP) headers used in Layer 2 network communications. The vulnerability arises from improper handling of the length parameter within LLC/SNAP headers, classified under CWE-130 (Improper Handling of Length Parameter) and CWE-290 (Authentication Bypass by Spoofing). This flaw allows an attacker to craft frames with invalid length fields that can bypass Layer 2 network filtering mechanisms such as IPv6 Router Advertisement (RA) guard. The bypass is facilitated through manipulation of LLC/SNAP headers combined with Ethernet to WiFi frame conversions and optionally VLAN0 headers. Essentially, network devices relying on these filtering capabilities may fail to properly validate or enforce security policies on malformed frames, enabling malicious traffic to circumvent protections designed to prevent unauthorized or rogue IPv6 router advertisements. The CVSS 3.1 base score of 4.7 reflects a medium severity, with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts integrity with a scope change (S:C), but does not affect confidentiality or availability. No known exploits have been reported in the wild, and no patches are currently linked, suggesting this is a protocol-level issue that may require vendor-specific mitigations or updates in network device firmware or software that implement 802.2 filtering logic.

Potential Impact

For European organizations, the impact of CVE-2021-27862 lies primarily in the potential circumvention of Layer 2 security controls designed to mitigate IPv6-based network attacks. IPv6 RA guard is widely deployed in enterprise and service provider networks to prevent rogue router advertisements that can lead to man-in-the-middle attacks, traffic interception, or denial of service. By exploiting this vulnerability, an attacker on the same local network segment could inject malicious IPv6 router advertisements despite filtering, potentially redirecting traffic or disrupting network operations. This risk is heightened in environments with mixed Ethernet and WiFi infrastructure where frame conversions occur, such as corporate campuses, public WiFi hotspots, and industrial control systems. Although the vulnerability does not directly compromise confidentiality or availability, the integrity of network routing information can be undermined, leading to indirect impacts such as data interception or network instability. Given the medium severity and the requirement for adjacent network access, the threat is more relevant to organizations with large, complex Layer 2 networks and those relying heavily on IPv6. European organizations with critical infrastructure, government networks, and large enterprises employing IPv6 and advanced Layer 2 filtering are particularly at risk if mitigations are not applied.

Mitigation Recommendations

Mitigation of CVE-2021-27862 requires a multi-layered approach beyond generic advice. Network administrators should audit and update firmware and software of network devices (switches, routers, wireless access points) to the latest versions that may include fixes or improved validation for LLC/SNAP header length handling. Where vendor patches are unavailable, consider deploying additional filtering at Layer 3 or using network intrusion detection/prevention systems capable of detecting anomalous IPv6 RA traffic. Implement strict segmentation and access controls to limit the ability of untrusted devices to connect to sensitive Layer 2 segments. Enable and enforce IEEE 802.1X port-based network access control to reduce unauthorized device access. Monitor network traffic for unusual or malformed frames indicative of exploitation attempts. Additionally, review and harden WiFi infrastructure configurations to minimize frame conversion vulnerabilities, including disabling unnecessary VLAN0 tagging and ensuring consistent frame validation across Ethernet and WiFi boundaries. Finally, maintain up-to-date IPv6 security best practices, including RA guard configurations, and consider deploying RA guard enhancements or alternative RA filtering mechanisms that validate frame integrity more robustly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
certcc
Date Reserved
2021-03-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682defd5c4522896dcc016a2

Added to database: 5/21/2025, 3:23:01 PM

Last enriched: 7/7/2025, 2:40:21 PM

Last updated: 8/18/2025, 11:33:04 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats