← Back to CVEs
CVE-2018-7084
CRITICAL9.8
Description
A command injection vulnerability is present that permits an unauthenticated user with access to the Aruba Instant web interface to execute arbitrary system commands within the underlying operating system. An attacker could use this ability to copy files, read configuration, write files, delete files, or reboot the device. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.1
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/10/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
arubanetworks:aruba_instantsiemens:scalance_w1750dsiemens:scalance_w1750d_firmware
Weaknesses (CWE)
CWE-78
References
http://www.securityfocus.com/bid/108374(security-alert@hpe.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf(security-alert@hpe.com)
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt(security-alert@hpe.com)
http://www.securityfocus.com/bid/108374(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.