First published: Mon Mar 29 2021(Updated: )
A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.5 and below; Aruba Instant 8.7.x: 8.7.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Instant | >=6.5.0.0<6.5.4.18 | |
Aruba Instant | >=8.3.0.0<8.3.0.14 | |
Aruba Instant | >=8.5.0.0<8.5.0.11 | |
Aruba Instant | >=8.6.0.0<8.6.0.6 | |
Aruba Instant | >=8.7.0.0<8.7.1.0 | |
Siemens SCALANCE W1750D | >=8.7.0<8.7.1.3 | |
Siemens Scalance W1750D Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24636 is classified as a critical vulnerability due to its potential for remote code execution.
CVE-2020-24636 affects various versions of Aruba Instant Access Point products and Siemens SCALANCE W1750D firmware.
To mitigate CVE-2020-24636, update the affected Aruba Instant Access Point software to the latest version beyond the vulnerable releases.
Yes, CVE-2020-24636 allows an attacker to execute arbitrary commands remotely, making it highly exploitable.
Yes, patches and updates for CVE-2020-24636 are available from Aruba Networks for the affected versions.