Security My6 Advisory · 7 min read

Advisory: ICMPv6 RA Guard Misconfigurations Exposing Enterprise IPv6 Networks

IPv6 Router Advertisement (RA) Guard is a critical Layer 2 security control for any network running IPv6. When misconfigured — or when implemented on unpatched hardware — it can be bypassed using well-documented techniques, leaving enterprise networks vulnerable to rogue router injection, SLAAC attacks, and denial of service. My6 Initiative Berhad has identified this as a recurring gap during IPv6 readiness assessments conducted across Malaysian enterprise and government networks.

What Is RA Guard?

IPv6 networks use Router Advertisement (RA) messages — ICMPv6 Type 134 — to inform hosts of available routers, prefixes, and address configuration parameters. In a dual-stack or IPv6-only enterprise network, any device that can send an RA message can effectively become the network's default gateway and redirect or intercept traffic.

RA Guard is a Layer 2 security mechanism, standardised in RFC 6105 (published February 2011), that is implemented directly on managed switches. The switch acts as an authorisation proxy: it inspects each ICMPv6 RA message and forwards only those arriving from ports explicitly configured as router-facing. RA messages arriving on host-facing ports are silently discarded.

Attack Classes Prevented

RA Guard, when correctly implemented, protects against three distinct attack types: Denial of Service via RA flooding that exhausts host NDP state tables; SLAAC attacks that inject rogue IPv6 prefixes causing hosts to configure attacker-controlled addresses; and Man-in-the-Middle attacks where an attacker issues an RA claiming a lower hop limit or a spoofed gateway MAC, redirecting all host traffic through an attacker-controlled device.

Relevant RFCs and Standards

RFCTitleYearRelevance
RFC 4861Neighbor Discovery for IPv62007Defines RA/RS messages and NDP protocol
RFC 3971SEcure Neighbor Discovery (SEND)2005Cryptographic alternative to RA Guard
RFC 6105IPv6 Router Advertisement Guard2011Original RA Guard specification
RFC 7113Implementation Advice for IPv6 RA Guard2014Documents bypass techniques and mitigations
RFC 6980Security Implications of IPv6 Fragmentation with ND2013Standards Track — forbids Fragment Header in all ND messages
RFC 7610DHCPv6-Shield2015Analogous protection for rogue DHCPv6 servers

How RA Guard Can Be Bypassed

RA Guard bypass techniques were first publicly disclosed by security researcher Marc Heuse (THC) in May 2011 via the Full Disclosure mailing list, within months of RFC 6105's publication. These are not theoretical — they are implemented in widely available security tools and confirmed effective against real hardware. RFC 7113, published in February 2014, formally documents these bypass methods and provides implementation guidance to address them.

1. Extension Header Chain Bypass (RFC 7113 §2.1)

An attacker prepends a Destination Options header (Next Header = 60) or Hop-by-Hop Options header before the ICMPv6 RA payload. Switches that only inspect the fixed IPv6 header's Next Header field for the value 58 (ICMPv6) will not recognise the packet as an RA and will forward it without inspection. This is described in RFC 7113 as a fundamental implementation failure in early RA Guard deployments.

2. IPv6 Fragmentation Bypass (RFC 7113 §2.2)

An attacker constructs a large (~1,400 byte) Destination Options Header and uses it to push the ICMPv6 RA payload into the second fragment of a fragmented IPv6 packet. The switch sees only extension headers in the first fragment and cannot identify it as an RA. RFC 7113 confirmed this technique was "effective against all existing implementations" at the time of writing.

RFC 6980 (a Standards Track document, August 2013) addresses this directly: it formally forbids the use of the IPv6 Fragment Header in all Neighbor Discovery messages, including RAs, and requires implementations to silently drop any fragmented ND message. A switch correctly implementing RFC 6980 drops fragmented RAs entirely, neutralising this bypass. However, switches running pre-RFC 6980 firmware may not enforce this.

3. VLAN and LLC/SNAP Header Stacking (CVE-2021-27853 family)

A more recently documented bypass class exploits the handling of VLAN 0 (priority tag) and 802.2 LLC/SNAP headers at the L2 processing layer. By prepending these headers, an attacker can cause some switch implementations to skip L2 security feature inspection entirely. These vulnerabilities were publicly disclosed by researcher Etienne Champetier and assigned as CERT/CC VU#855201 in September 2022.

CVEAttack VectorCVSSAffected Vendors
CVE-2021-27853VLAN 0 + LLC/SNAP headers4.7 MediumCisco, Juniper, Arista
CVE-2021-27854VLAN 0 + LLC/SNAP + Ethernet↔WiFi conversion4.7 MediumJuniper, Arista
CVE-2021-27861LLC/SNAP invalid length (optional VLAN0)4.7 MediumCisco, Arista
CVE-2021-27862LLC/SNAP invalid length + Ethernet→WiFi4.7 MediumArista

Vendor patches for this family are available. Juniper released fixes in Junos OS 21.4R3, 22.1R2+, 22.2R2+, and 22.3R1+. Cisco's workaround involves L2 ACLs restricting ethertypes to 0x86DD (IPv6), 0x0800 (IPv4), and 0x0806 (ARP) on access ports. Arista published Security Advisory 0080.

Common Misconfigurations Observed in Enterprise Deployments

Beyond the protocol-level bypasses, My6's assessments and industry documentation point to several recurring configuration errors that undermine RA Guard even on patched hardware:

01
VLAN-level vs. interface-level policy application. Some implementations apply RA Guard at the VLAN level when the guard must be applied per-interface. Penetration testers have confirmed that VLAN-level application alone does not block RA attacks — interface-level policy is required.
02
Failure to configure router-facing uplinks. From Cisco IOS 15.2(2)E onwards, all ports default to device-role host. Uplinks to legitimate routers must be explicitly configured with device-role router, otherwise Router Solicitation messages from the router will not be forwarded to hosts.
03
Partial First-Hop Security stack deployment. RA Guard deployed without DHCPv6-Shield (RFC 7610), IPv6 Snooping / ND Inspection, and Source Guard leaves complementary attack vectors open. All IPv6 First-Hop Security (FHS) features should be deployed as a complete stack.
04
Trunk port and inter-switch gaps. RA Guard on access ports is irrelevant if trunk ports, uplink interfaces, or unmanaged switches allow RA traffic to bypass protected segments. RA Guard must be consistently applied across all Layer 2 boundaries.
05
IPv6 tunnel bypass (fundamental limitation). RFC 6105 §5 explicitly acknowledges that RA Guard cannot inspect RA messages carried inside IPv6 tunnels (6in4, 6to4, ISATAP, GRE). Any tunnel endpoint on the local segment bypasses RA Guard entirely. Tunnel usage must be separately controlled.
06
No periodic testing. RA Guard configuration is typically set during initial deployment and not retested after firmware upgrades, topology changes, or the addition of wireless APs. Regressions in FHS configuration after upgrades are a common source of re-introduced vulnerabilities.

Testing RA Guard: Available Tools

Network security engineers and IPv6 auditors can verify RA Guard effectiveness using:

⚠ Legal Notice

Security testing tools should only be used on networks you own or have explicit written authorisation to test. Unauthorised use may violate the Computer Crimes Act 1997 (Malaysia) and equivalent legislation in other jurisdictions.

Recommendations

For organisations operating dual-stack or IPv6-only enterprise networks, My6 Initiative Berhad recommends the following:

  1. Apply RA Guard at the interface level on all access ports with device-role host. Do not rely on VLAN-level application alone.
  2. Explicitly configure router-facing uplinks with device-role router and define an RA Guard policy that validates RA content (prefix lists, hop limits, flags).
  3. Ensure firmware on all managed switches includes patches for CVE-2021-27853 and related CVEs (CERT/CC VU#855201). Apply vendor-specific L2 ACLs as defence-in-depth where patches are not yet available.
  4. Deploy the full IPv6 First-Hop Security stack: RA Guard + DHCPv6-Shield + IPv6 Snooping/ND Inspection + Source Guard + Destination Guard.
  5. Configure switches to drop fragmented Neighbor Discovery messages per RFC 6980, which eliminates the fragmentation bypass class entirely.
  6. Verify that RA Guard is applied consistently at all L2 boundaries including trunk ports, wireless AP uplinks, and inter-switch links.
  7. Schedule periodic RA Guard testing using THC-IPv6 or equivalent tools after any firmware upgrade or topology change.
  8. If IPv6 is not operationally required on a given segment, disable it entirely at both the interface and host level — this eliminates the entire RA attack surface.
My6 Initiative Berhad — Advisory

My6 Initiative Berhad conducts IPv6 security assessments as part of its IPv6 Readiness Assessment service. RA Guard misconfiguration is among the most consistently identified gaps in enterprise IPv6 deployments assessed since 2010. If your organisation is deploying or auditing an IPv6 network, contact My6 for a formal assessment at [email protected].

References & Standards

  1. RFC 6105 — IPv6 Router Advertisement Guard (Feb 2011). datatracker.ietf.org/doc/html/rfc6105
  2. RFC 7113 — Implementation Advice for IPv6 RA Guard (Feb 2014). datatracker.ietf.org/doc/html/rfc7113
  3. RFC 6980 — Security Implications of IPv6 Fragmentation with Neighbor Discovery (Aug 2013). datatracker.ietf.org/doc/html/rfc6980
  4. RFC 4861 — Neighbor Discovery for IPv6 (Sep 2007). datatracker.ietf.org
  5. RFC 7610 — DHCPv6-Shield: Protecting Against Rogue DHCPv6 Servers (Aug 2015). datatracker.ietf.org
  6. CERT/CC Vulnerability Note VU#855201 (Sep 2022, updated Dec 2025). CVE-2021-27853 / CVE-2021-27854 / CVE-2021-27861 / CVE-2021-27862. kb.cert.org/vuls/id/855201
  7. Cisco. IPv6 First-Hop Security Configuration Guide — IPv6 RA Guard. cisco.com
  8. Juniper Networks Security Advisory — CVE-2021-27853 family. supportportal.juniper.net
  9. Kali Linux Tools — THC-IPv6. kali.org/tools/thc-ipv6/
  10. Marc Heuse / THC (May 2011). RA Guard bypass disclosure, Full Disclosure mailing list. seclists.org
  11. Gont, F. SI6 Networks IPv6 Toolkit. si6networks.com
  12. ipSpace.net. First-Hop IPv6 Security Features in Cisco IOS (Jul 2013). blog.ipspace.net