First published: Tue Sep 07 2021(Updated: )
A remote arbitrary command execution vulnerability was discovered in Aruba Operating System Software version(s): Prior to 8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.16. Aruba has released patches for ArubaOS that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=8.3.0.0<8.3.0.16 | |
Arubanetworks Arubaos | >=8.5.0.0<8.5.0.12 | |
Arubanetworks Arubaos | >=8.6.0.0<8.6.0.8 | |
Arubanetworks Arubaos | >=8.7.0.0<8.7.1.2 | |
Siemens Scalance W1750d Firmware | <8.7.1.3 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37723 is a remote arbitrary command execution vulnerability discovered in Aruba Operating System Software.
Aruba Operating System Software versions prior to 8.7.1.2, 8.6.0.8, 8.5.0.12, and 8.3.0.16 are affected by CVE-2021-37723.
The severity of CVE-2021-37723 is critical with a CVSS score of 7.2.
Yes, Aruba has released patches for ArubaOS to address the CVE-2021-37723 vulnerability.
You can find more information about CVE-2021-37723 at the following references: [Reference 1](https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf) and [Reference 2](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt).