First published: Tue Mar 30 2021(Updated: )
A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.6 and below; Aruba Instant 8.7.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Instant | >=6.4.0.0<=6.4.4.8-4.2.4.18 | |
Arubanetworks Instant | >=6.5.0.0<6.5.4.19 | |
Arubanetworks Instant | >=8.3.0.0<8.3.0.15 | |
Arubanetworks Instant | >=8.5.0.0<8.5.0.12 | |
Arubanetworks Instant | >=8.6.0.0<8.6.0.7 | |
Arubanetworks Instant | >=8.7.0.0<8.7.1.1 | |
Siemens Scalance W1750d Firmware | >=8.7.0<8.7.1.3 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-25155.
The severity level of CVE-2021-25155 is high with a severity value of 6.5.
The Aruba Instant Access Point products affected by CVE-2021-25155 are Aruba Instant 6.4.x, Aruba Instant 6.5.x, Aruba Instant 8.3.x, and Aruba Instant 8.5.x.
The vulnerability can be exploited remotely to perform arbitrary file modifications.
Yes, patches and updates are available to fix CVE-2021-25155. It is recommended to update to the latest version of the affected software.