mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
242 lines
8.2 KiB
JSON
242 lines
8.2 KiB
JSON
{
|
|
"id": "CVE-2021-37731",
|
|
"sourceIdentifier": "security-alert@hpe.com",
|
|
"published": "2021-09-07T13:15:08.070",
|
|
"lastModified": "2021-11-26T21:37:39.260",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A local path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.0-2.2.0.4; Prior to 8.7.1.1, 8.6.0.7, 8.5.0.12, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se ha detectado una vulnerabilidad de salto de ruta local en Aruba SD-WAN Software and Gateways; Aruba Operating System Software versiones: anteriores a 8.6.0.0-2.2.0.4; anteriores a 8.7.1.1, 8.6.0.7, 8.5.0.12, 8.3.0.16. Aruba ha publicado parches para Aruba SD-WAN Software and Gateways y ArubaOS que solucionan esta vulnerabilidad de seguridad"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "PHYSICAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.2,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.3,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "2.2.0.0",
|
|
"versionEndExcluding": "2.2.0.4",
|
|
"matchCriteriaId": "E4BAB5F6-D00B-49DA-A9C9-26D19168185B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.3.0.0",
|
|
"versionEndExcluding": "8.3.0.15",
|
|
"matchCriteriaId": "C7025607-CDA9-4A3A-BB64-93C2B5E77DBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.5.0.0",
|
|
"versionEndExcluding": "8.5.0.12",
|
|
"matchCriteriaId": "52A8E4BB-BCA7-4ADA-AB8C-261B35FFF83F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.6.0.0",
|
|
"versionEndExcluding": "8.6.0.8",
|
|
"matchCriteriaId": "CCACC080-B78C-4DC7-8D92-333D7ACB30D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "8.7.0.0",
|
|
"versionEndExcluding": "8.7.1.2",
|
|
"matchCriteriaId": "11CB4B7D-E78D-400F-B1B8-979D51776066"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7005:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE128072-9444-40D5-AC86-BB317869EB97"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7008:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F747F71E-66BC-4776-BCCC-3123F8EEEBC6"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59612211-5054-44DC-B028-61A2C5C6133D"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7024:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "15FE873C-3C45-4EA3-9AD1-D07F132BC31F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8E68DB6-149B-4469-BD27-69F1AC59166F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E9AA178-1327-402E-8740-8409ECA448BC"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9969F899-4D7A-4DD5-B81D-DB16B20CF86A"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF33BAD0-0596-4910-B096-99E2033F73D8"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDDFDA5E-3895-463A-86EA-1823EC1B5045"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3BBA9A71-BE10-471A-A8BE-5CCB8CE8393F"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFA13FF5-7C60-48B4-AF46-18A9F19D5D42"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0B1EB3D9-77B5-4DBE-9518-23DD0DA06BC9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17162DB3-973E-47C6-9157-39A0E94603F2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "8.7.1.3",
|
|
"matchCriteriaId": "B4603220-61F1-4686-B55D-F9F5D27F324A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf",
|
|
"source": "security-alert@hpe.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt",
|
|
"source": "security-alert@hpe.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |