
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-47160 affects the Linux kernel's mt7530 driver in the DSA (Distributed Switch Architecture) subsystem. The vulnerability was discovered and disclosed in March 2024. The issue involves a VLAN traffic leak vulnerability where the PCR_MATRIX field was set to all 1's when VLAN filtering is enabled but was not reset when disabled (Kernel Git).
The vulnerability occurs in the mt7530_port_set_vlan_aware function within the mt7530 driver. When VLAN filtering is enabled, the PCR_MATRIX field is set to ALL_MEMBERS, but this setting persists even after VLAN filtering is disabled. This misconfiguration allows traffic to leak between different VLANs that should be isolated (Kernel Git).
When exploited, this vulnerability allows traffic to leak between different bridge interfaces that should be isolated. For example, when two bridges (br0 and br1) are created with VLAN filtering initially enabled and then disabled, traffic between br0 and br1 will start leaking to each other, compromising network isolation (Kernel Git).
The issue has been fixed by removing the PCR_MATRIX write from mt7530_port_set_vlan_aware function, as port_bridge_{add,del} functions already handle PCR_MATRIX properly. Users should update to a patched version of the Linux kernel that includes this fix (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."