First published: Tue Sep 07 2021(Updated: )
A remote path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.0-2.2.0.4; Prior to 8.7.1.3, 8.6.0.9, 8.5.0.12, 8.3.0.16, 6.5.4.19, 6.4.4.25. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=2.2.0.0<2.2.0.4 | |
Arubanetworks Sd-wan | ||
Arubanetworks Arubaos | >=6.4.4.0<6.4.4.25 | |
Arubanetworks Arubaos | >=6.5.4.0<6.5.4.19 | |
Arubanetworks Arubaos | >=8.3.0.0<8.3.0.16 | |
Arubanetworks Arubaos | >=8.5.0.0<8.5.0.12 | |
Arubanetworks Arubaos | >=8.6.0.0<8.6.0.9 | |
Arubanetworks Arubaos | >=8.7.0.0<8.7.1.3 | |
Siemens Scalance W1750d Firmware | <8.7.1.3 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37729 is a remote path traversal vulnerability found in Aruba SD-WAN Software and Gateways.
CVE-2021-37729 affects Aruba SD-WAN Software and Gateways versions prior to 8.6.0.0-2.2.0.4, and versions prior to 8.7.1.3, 8.6.0.9, 8.5.0.12, 8.3.0.16, 6.5.4.19, and 6.4.4.25.
CVE-2021-37729 has a severity level of 6.5, which is considered medium.
To fix CVE-2021-37729, make sure to apply the patches released by Aruba for the affected SD-WAN Software and Gateways versions.
You can find more information about CVE-2021-37729 on the Aruba Networks website and the Siemens CERT Portal.