A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf | Patch Third Party Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf | Patch Third Party Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf - Patch, Third Party Advisory | |
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt - Vendor Advisory |
Information
Published : 2021-03-30 01:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25150
Mitre link : CVE-2021-25150
CVE.ORG link : CVE-2021-25150
JSON object : View
Products Affected
arubanetworks
- instant
siemens
- scalance_w1750d
- scalance_w1750d_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')