First published: Tue Mar 30 2021(Updated: )
A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.6 and below; Aruba Instant 8.6.x: 8.6.0.2 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Instant | >=6.4.0.0<=6.4.4.8-4.2.4.17 | |
Arubanetworks Instant | >=6.5.0.0<6.5.4.17 | |
Arubanetworks Instant | >=8.3.0.0<8.3.0.13 | |
Arubanetworks Instant | >=8.5.0.0<8.5.0.7 | |
Arubanetworks Instant | >=8.6.0.0<8.6.0.3 | |
Siemens Scalance W1750d Firmware | <8.7.0 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5319 is a remote buffer overflow vulnerability discovered in certain Aruba Instant Access Point (IAP) products.
CVE-2019-5319 affects Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.6 and below.
CVE-2019-5319 has a severity rating of 9.8 (Critical).
To mitigate CVE-2019-5319, it is recommended to update to a version that is not affected by the vulnerability, as specified by Aruba Networks.
More information about CVE-2019-5319 can be found in the official advisories published by Aruba Networks and Siemens.