A command injection vulnerability is present that permits an unauthenticated user with access to the Aruba Instant web interface to execute arbitrary system commands within the underlying operating system. An attacker could use this ability to copy files, read configuration, write files, delete files, or reboot the device. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.1
References
Link | Resource |
---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf | Third Party Advisory |
http://www.securityfocus.com/bid/108374 | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Information
Published : 2019-05-10 11:29
Updated : 2023-03-20 11:11
NVD link : CVE-2018-7084
Mitre link : CVE-2018-7084
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
arubanetworks
- aruba_instant
siemens
- scalance_w1750d
- scalance_w1750d_firmware