First published: Fri May 10 2019(Updated: )
A command injection vulnerability is present that permits an unauthenticated user with access to the Aruba Instant web interface to execute arbitrary system commands within the underlying operating system. An attacker could use this ability to copy files, read configuration, write files, delete files, or reboot the device. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.1
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Aruba Instant | >=4.0<4.2.4.12 | |
Arubanetworks Aruba Instant | >=6.5.0<6.5.4.11 | |
Arubanetworks Aruba Instant | >=8.3.0<8.3.0.6 | |
Arubanetworks Aruba Instant | >=8.4.0<8.4.0.1 | |
Siemens Scalance W1750d Firmware | <8.4.0.1 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7084 is a command injection vulnerability present in the Aruba Instant web interface, allowing an unauthenticated user to execute arbitrary system commands.
CVE-2018-7084 affects Aruba Instant versions ranging from 4.0 to 4.2.4.12, 6.5.0 to 6.5.4.11, 8.3.0 to 8.3.0.6, and 8.4.0 to 8.4.0.1.
An attacker exploiting CVE-2018-7084 can perform actions like copying files, reading configuration, writing files, and deleting files on the underlying operating system.
CVE-2018-7084 has a severity rating of 9.8 out of 10, making it critical.
To mitigate CVE-2018-7084, users should update their Aruba Instant software to a version that is not affected.