If a process running within Aruba Instant crashes, it may leave behind a "core dump", which contains the memory contents of the process at the time it crashed. It was discovered that core dumps are stored in a way that unauthenticated users can access them through the Aruba Instant web interface. Core dumps could contain sensitive information such as keys and passwords. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0
2019-05-10T17:29:01.173
2024-11-21T04:11:37.367
Modified
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | arubanetworks | aruba_instant | < 4.2.4.12 | Yes |
Application | arubanetworks | aruba_instant | < 6.5.4.11 | Yes |
Application | arubanetworks | aruba_instant | < 8.3.0.6 | Yes |
Operating System | siemens | scalance_w1750d_firmware | < 8.4.0.1 | Yes |
Hardware | siemens | scalance_w1750d | - | No |