First published: Tue Sep 07 2021(Updated: )
A remote arbitrary command execution vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.7.1.4, 8.6.0.9, 8.5.0.13, 8.3.0.16, 6.5.4.20, 6.4.4.25. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks SD-WAN | >=2.2.0.0<2.2.0.4 | |
ArubaOS | >=6.4.4.0<6.4.4.25 | |
ArubaOS | >=6.5.4.0<6.5.4.20 | |
ArubaOS | >=8.3.0.0<8.3.0.16 | |
ArubaOS | >=8.5.0.0<8.5.0.13 | |
ArubaOS | >=8.6.0.0<8.6.0.9 | |
ArubaOS | >=8.7.0.0<8.7.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37719 has been classified as a critical vulnerability due to its potential for remote arbitrary command execution.
To mitigate CVE-2021-37719, update all affected Aruba SD-WAN Software and Aruba Operating System Software to the latest patched versions.
CVE-2021-37719 affects Aruba SD-WAN Software and Aruba Operating System versions prior to 8.6.0.4-2.2.0.4, 8.7.1.4, 8.6.0.9, 8.5.0.13, 8.3.0.16, 6.5.4.20, and 6.4.4.25.
Yes, Aruba Networks has released security patches for CVE-2021-37719 that should be applied as soon as possible.
Failing to address CVE-2021-37719 leaves systems vulnerable to remote command execution attacks, potentially compromising data integrity and security.