First published: Fri May 10 2019(Updated: )
If a process running within Aruba Instant crashes, it may leave behind a "core dump", which contains the memory contents of the process at the time it crashed. It was discovered that core dumps are stored in a way that unauthenticated users can access them through the Aruba Instant web interface. Core dumps could contain sensitive information such as keys and passwords. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Aruba Instant | >=4.0<4.2.4.12 | |
Arubanetworks Aruba Instant | >=6.5.0<6.5.4.11 | |
Arubanetworks Aruba Instant | >=8.3.0<8.3.0.6 | |
Siemens Scalance W1750d Firmware | <8.4.0.1 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7083 is a vulnerability that allows unauthenticated users to access core dumps through the Aruba Instant web interface.
CVE-2018-7083 affects Aruba Instant versions 4.0 to 4.2.4.12, 6.5.0 to 6.5.4.11, and 8.3.0 to 8.3.0.6.
A core dump is a file that contains the memory contents of a process at the time it crashed.
CVE-2018-7083 has a severity score of 7.5 (High).
To protect your Aruba Instant, update to a version of Aruba Instant that is not affected by CVE-2018-7083.