A remote path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.7.1.1, 8.6.0.7, 8.5.0.11, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf | Exploit Third Party Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf | Exploit Third Party Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf - Exploit, Third Party Advisory | |
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt - Vendor Advisory |
Information
Published : 2021-09-07 13:15
Updated : 2024-11-21 06:15
NVD link : CVE-2021-37733
Mitre link : CVE-2021-37733
CVE.ORG link : CVE-2021-37733
JSON object : View
Products Affected
siemens
- scalance_w1750d_firmware
- scalance_w1750d
arubanetworks
- sd-wan
- arubaos
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')