First published: Wed Feb 12 2020(Updated: )
A remotely exploitable information disclosure vulnerability is present in Aruba Intelligent Edge Switch models 5400, 3810, 2920, 2930, 2530 with GigT port, 2530 10/100 port, or 2540. The vulnerability impacts firmware 16.08.* before 16.08.0009, 16.09.* before 16.09.0007 and 16.10.* before 16.10.0003. The vulnerability allows an attacker to retrieve sensitive system information. This attack can be carried out without user authentication under very specific conditions.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks 5400r Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 5400r Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 5400r Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 5400r | ||
Arubanetworks 3810 Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 3810 Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 3810 Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 3810 | ||
Arubanetworks 2920 Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 2920 Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 2920 Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 2920 | ||
Arubanetworks 2930 Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 2930 Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 2930 Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 2930 | ||
Arubanetworks 2530 With Gigt Port Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 2530 With Gigt Port Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 2530 With Gigt Port Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 2530 With Gigt Port | ||
Arubanetworks 2530 10\/100 Port Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 2530 10\/100 Port Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 2530 10\/100 Port Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 2530 10\/100 Port | ||
Arubanetworks 2540 Firmware | >=16.08.0<16.08.0009 | |
Arubanetworks 2540 Firmware | >=16.09.0<16.09.0007 | |
Arubanetworks 2540 Firmware | >=16.10.0<16.10.0003 | |
Arubanetworks 2540 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.