First published: Tue Oct 12 2021(Updated: )
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Aruba Instant | >=6.4.0.2-4.1.0.0<6.4.4.8-4.2.4.19 | |
Arubanetworks Aruba Instant | >=6.5.4.0<6.5.4.20 | |
Arubanetworks Aruba Instant | >=8.5.0.0<8.5.0.12 | |
Arubanetworks Aruba Instant | >=8.6.0.0<8.6.0.11 | |
Arubanetworks Aruba Instant | >=8.7.0.0<8.7.1.3 | |
Siemens Scalance W1750d Firmware | >=8.7.1.3 | |
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-37730 is critical with a severity value of 7.2.
The affected software for CVE-2021-37730 is HPE Aruba Instant (IAP) versions Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.0.0 - 8.7.1.3.
To fix CVE-2021-37730, it is recommended to update to the latest version of HPE Aruba Instant (IAP) that addresses this vulnerability.
More information about CVE-2021-37730 can be found in the following references: [Reference 1](https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf) and [Reference 2](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt).
The Common Weakness Enumeration (CWE) identifier for CVE-2021-37730 is CWE-78.