Skip to main content

CVE-2021-47160: Vulnerability in Linux Linux

High
VulnerabilityCVE-2021-47160cvecve-2021-47160
Published: Mon Mar 25 2024 (03/25/2024, 09:16:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: dsa: mt7530: fix VLAN traffic leaks PCR_MATRIX field was set to all 1's when VLAN filtering is enabled, but was not reset when it is disabled, which may cause traffic leaks: ip link add br0 type bridge vlan_filtering 1 ip link add br1 type bridge vlan_filtering 1 ip link set swp0 master br0 ip link set swp1 master br1 ip link set br0 type bridge vlan_filtering 0 ip link set br1 type bridge vlan_filtering 0 # traffic in br0 and br1 will start leaking to each other As port_bridge_{add,del} have set up PCR_MATRIX properly, remove the PCR_MATRIX write from mt7530_port_set_vlan_aware.

AI-Powered Analysis

AILast updated: 06/26/2025, 18:36:39 UTC

Technical Analysis

CVE-2021-47160 is a vulnerability identified in the Linux kernel's handling of VLAN (Virtual Local Area Network) traffic filtering within the Distributed Switch Architecture (DSA) driver for the mt7530 switch chip. The issue arises due to improper management of the PCR_MATRIX field, which is used to control VLAN traffic filtering behavior. Specifically, when VLAN filtering is enabled on bridge interfaces, the PCR_MATRIX field is set to all 1's, effectively allowing all VLAN traffic. However, when VLAN filtering is subsequently disabled, the PCR_MATRIX field is not reset accordingly. This oversight causes VLAN traffic to leak between bridge interfaces that should be isolated, violating network segmentation and potentially exposing sensitive data or allowing unauthorized network access. The vulnerability manifests in scenarios where multiple bridge interfaces with VLAN filtering are created and then disabled, as demonstrated by the sequence of commands in the description. The root cause is a redundant write to PCR_MATRIX in the mt7530_port_set_vlan_aware function, which conflicts with proper setup done in port_bridge_add and port_bridge_del functions. The fix involves removing this redundant write to ensure PCR_MATRIX is correctly managed and traffic isolation is maintained. This vulnerability affects Linux kernel versions containing the specified commit hashes, which correspond to affected mt7530 DSA driver implementations. Although no known exploits are reported in the wild, the flaw can lead to VLAN traffic leakage, undermining network segmentation and security policies in environments relying on Linux bridges and VLAN filtering with mt7530 switches.

Potential Impact

For European organizations, especially those operating data centers, telecommunications infrastructure, or industrial control systems using Linux-based network devices with mt7530 switch chips, this vulnerability poses a risk of unauthorized data exposure and network segmentation bypass. VLAN traffic leakage can allow attackers or unauthorized users to intercept or inject traffic across logically separated networks, potentially leading to data breaches, lateral movement within networks, or disruption of network services. Organizations relying on Linux bridges for multi-tenant environments, cloud infrastructure, or critical communication networks may face confidentiality and integrity risks. The impact is heightened in regulated sectors such as finance, healthcare, and critical infrastructure, where strict network isolation is mandated. Although exploitation requires administrative privileges to configure bridges and VLAN filtering, insider threats or compromised administrative accounts could leverage this vulnerability to escalate access or exfiltrate sensitive information. The absence of known exploits reduces immediate urgency, but the vulnerability's nature warrants prompt attention to prevent future exploitation.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2021-47160 as soon as they become available from trusted sources or Linux distributions. 2. Audit and monitor configurations of Linux bridges and VLAN filtering, especially on systems using mt7530 switches, to detect unexpected changes or traffic patterns indicative of VLAN leakage. 3. Restrict administrative access to network configuration interfaces to trusted personnel and enforce strong authentication and authorization controls to prevent unauthorized bridge or VLAN modifications. 4. Implement network segmentation monitoring tools that can detect cross-VLAN traffic anomalies, providing early warning of potential traffic leaks. 5. For environments where patching is delayed, consider disabling VLAN filtering on affected bridges or isolating vulnerable devices until remediation is applied. 6. Regularly review and update network device firmware and Linux kernel versions to incorporate security fixes and improvements. 7. Incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and mitigation if exploitation attempts occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-25T09:12:14.109Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9ef8

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/26/2025, 6:36:39 PM

Last updated: 8/5/2025, 8:33:36 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats