Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-7083


If a process running within Aruba Instant crashes, it may leave behind a "core dump", which contains the memory contents of the process at the time it crashed. It was discovered that core dumps are stored in a way that unauthenticated users can access them through the Aruba Instant web interface. Core dumps could contain sensitive information such as keys and passwords. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.0


Published

2019-05-10T17:29:01.173

Last Modified

2024-11-21T04:11:37.367

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application arubanetworks aruba_instant < 4.2.4.12 Yes
Application arubanetworks aruba_instant < 6.5.4.11 Yes
Application arubanetworks aruba_instant < 8.3.0.6 Yes
Operating System siemens scalance_w1750d_firmware < 8.4.0.1 Yes
Hardware siemens scalance_w1750d - No

References