CVE-2018-7084

A command injection vulnerability is present that permits an unauthenticated user with access to the Aruba Instant web interface to execute arbitrary system commands within the underlying operating system. An attacker could use this ability to copy files, read configuration, write files, delete files, or reboot the device. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.1
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*

History

20 Mar 2023, 18:11

Type Values Removed Values Added
First Time Siemens scalance W1750d Firmware
Siemens
Siemens scalance W1750d
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/108374 - (BID) http://www.securityfocus.com/bid/108374 - Broken Link, Third Party Advisory, VDB Entry
CPE cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*

Information

Published : 2019-05-10 18:29

Updated : 2023-12-10 12:59


NVD link : CVE-2018-7084

Mitre link : CVE-2018-7084

CVE.ORG link : CVE-2018-7084


JSON object : View

Products Affected

siemens

  • scalance_w1750d_firmware
  • scalance_w1750d

arubanetworks

  • aruba_instant
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')