First published: Tue Mar 30 2021(Updated: )
A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Instant | >=6.5.0.0<6.5.4.18 | |
Arubanetworks Instant | >=8.3.0.0<8.3.0.14 | |
Arubanetworks Instant | >=8.5.0.0<8.5.0.11 | |
Arubanetworks Instant | >=8.6.0.0<8.6.0.5 | |
Siemens Scalance W1750d Firmware | <8.7.0 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-25150.
The severity of CVE-2021-25150 is critical.
Aruba Instant Access Point (IAP) products in versions: Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below.
Apply the necessary patches or updates provided by Aruba Networks to the affected products.
You can find more information about CVE-2021-25150 in the following references: [link1](https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf), [link2](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt).